Vulnerabilities / Threats
4/22/2013
11:08 AM
Connect Directly
RSS
E-Mail
50%
50%

Oracle Bug Hunter Spots Java 7 Server Flaw

Server Java Runtime Environment vulnerability can be used to escape sandbox and execute code, says Polish security expert.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
Another week, another warning that a new vulnerability has been discovered in Java.

Last week, Oracle released Java 7 update 21, which patched 42 new vulnerabilities. Come Monday, however, a security researcher warned that he'd discovered a reflection API vulnerability in the newly shipped Server Java Runtime Environment (JRE).

"The new flaw was verified to affect all versions of Java SE 7 (including the recently released 1.7.0_21-b11)," said veteran Java bug hunter Adam Gowdiak, CEO and founder of Poland-based Security Explorations, in a Monday post to the Full Disclosure mailing list. "It can be used to achieve a complete Java security sandbox bypass on a target system. Successful exploitation in a Web browser scenario requires proper user interaction (a user needs to accept the risk of executing a potentially malicious Java application when a security warning window is displayed)." Gowdiak said he filed a bug report -- including proof-of-concept exploit code -- with Oracle Monday, according to a Security Explorations vulnerability log.

[ Are you a WordPress user? Read WordPress Hackers Exploit Username 'Admin'. ]

The vulnerability could be used to escape the Java sandbox and execute arbitrary code on a client or server, although for a client-side attack, a user would have to allow a malicious application that exploits the vulnerability to run.

Java reflection API vulnerabilities have been an ongoing challenge for Oracle. The vulnerabilities involve tricking a challenge-response security system into revealing the answer to its own challenge. But this bug is a little different. "What's interesting is that the new issue is present not only in JRE Plugin / JDK software, but also the recently announced Server JRE as well," Gowdiak said.

First released last week with Java 7 update 21, Oracle describes Server JRE -- available for 64-bit Linux, Solaris and Windows systems -- as "a runtime environment specifically targeted for deploying Java in server environments ... [that] includes tools for JVM monitoring and tools commonly required for server applications, but does not include browser integration (the Java plug-in)."

That's notable, because the chief Java security worry centers on vulnerabilities in the Java browser plug-in -- because the plug-in can be directly targeted via malicious websites or phishing attacks -- rather than JavaScript, Enterprise JavaBeans, embedded Java, or Java running on Android.

But could attackers easily compromise vulnerabilities in Server JRE? Although Gowdiak hasn't publicly revealed any further details of the vulnerability he discovered, he did note that anyone questioning how a server-side flaw might be exploited should refer to Oracle's "Secure Coding Guidelines for a Java Programming Language" (section 3-8), which warns: "Take care interpreting untrusted code." The guidelines also say that "code can be hidden in a number of places," and that unless code has been validated, it should be restricted to a sandbox. Finally, it warns that Java components -- or APIs -- that might be used to introduce untrusted code include SQL. "Many SQL implementations allow execution of code with effects outside of the database itself," said Oracle.

Other potential untrusted code introduction -- or attack -- vectors include remote method invocation (RMI) and LDAP code loading, JavaBeans components, and the Sun implementation of the XSLT interpreter, which "enables extensions to call Java code," according to Oracle, although this feature can be disabled.

Despite the new Java bug warning, Oracle has been stepping up the pace of its Java patching efforts, releasing five Java 7 updates since the start of 2013, as well as a new malicious application warning system for suspicious Java applications. That security work, however, last week led the company's lead Java architect to call for the release of Java 8 to be delayed, so sufficient resources could continue to be devoted to better securing Java 7.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0560
Published: 2014-09-17
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.

CVE-2014-0561
Published: 2014-09-17
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567.

CVE-2014-0562
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

CVE-2014-0563
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

CVE-2014-0565
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0566.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant