Vulnerabilities / Threats
2/26/2013
12:05 PM
50%
50%

2 More Java Zero-Day Vulnerabilities Emerge

While Oracle investigates reports that two bugs in Java 7 could allow attackers to remotely bypass the sandbox and compromise a system, security experts reiterate: If you don't need Java, turn it off.

Cue yet another Java security warning: A security researcher said he's spotted two new zero-day vulnerabilities in Java 7.

"We had yet another look into Oracle's Java SE 7 software that was released by the company on Feb. 19, 2013," said veteran Java bug hunter Adam Gowdiak, CEO and founder of Poland-based Security Explorations, in an email to the Bugtraq mailing list. "We have discovered two new security issues (numbered 54 and 55), which when combined together can be successfully used to gain a complete Java security sandbox bypass in the environment of Java SE 7 Update 15."

In other words, the most recently released version of Java has flaws that could be remotely exploited by attackers to bypass the built-in sandbox and compromise not only the Java software, but the system on which it's running.

[ For the latest in the ongoing Java security concerns, see Oracle, Apple Issue Java Security Patches. ]

Oracle has recently been issuing what seems like a never-ending stream of Java updates. On February 1, its out-of-band patch for Java fixed 50 bugs in Java 6 and 7. On February 19, meanwhile, Oracle released another emergency update -- in the form of Java 7 update 15 and Java 6 update 41 -- that fixed still more flaws, including prior bugs spotted by Gowdiak.

Both of the new bugs found by Gowdiak exist only in Java 7, he said, and both "abuse the Reflection API in a particularly interesting way," although he declined to publicly release further details. Briefly, a reflection attack tricks a challenge-response security system into revealing the answer to its own challenge, and this wouldn't be the first reflection vulnerability to have been discovered in Java.

Oracle has confirmed receiving the vulnerability details and said it's now investigating the alleged bugs. "We provided Oracle with a brief technical description of the issues found, along with a working proof of concept code that illustrates their impact," said Gowdiak. His numbering of the flaws -- "issue 54" and "issue 55" -- reflect the number of unique Java vulnerabilities his firm has discovered and reported to Oracle or Apple since April 2012. "Without going into further details, everything indicates that a ball is in Oracle's court," he said. "Again."

What's the risk from the new zero-day bugs? "The concern is that the flaws could be exploited to completely bypass Java's security sandbox and infect computers in a similar fashion to the attacks which recently troubled the likes of Facebook, Apple and Microsoft," said Graham Cluley, senior technology consultant at Sophos, in a blog post.

Those three businesses, along with Twitter, appeared to have had multiple Apple OS X systems compromised after employees browsed to a popular iOS development site. The apparent watering-hole attack approach -- to infect a target, first infect a website they regularly visit -- was sophisticated in that it targeted a never-before-seen zero-day flaw in Java. It was also targeted, since it would have affected only mobile iOS developers.

While those four businesses have publicly acknowledged being compromised, security experts suspect that many more businesses were breached by attackers, who may have been seeking sensitive source code and customer data with a resale value, or even a way to install backdoors in iOS software.

Given the discovery of the two new flaws in Java, Cluley said, "Here's the best piece of advice we can give you right now: If you don't need Java enabled in your browser, turn it off now."

Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple Deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by March 2 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology. Register for Interop today!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?