Home > Security > New Java Exploit

New Java Exploit

Multiple vulnerabilities have been found in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier that allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by

  1. using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then
  2. using “reflection with a trusted immediate caller” to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.

For more information, see CVE-2012-4681: http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-4681

Oracle has addressed the vulnerability in following security alert: http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html

UPDATE:

  • Aug. 30, 2012: Oracle has released updates for both JRE 6 (Update 35) and 7 (Update 7). Users are advised to update their JRE as soon as possible.
  • Sept. 6, 2012: Apple today released Java 6 Update 35 for OS X. Nothing lately in the news about the known bugs still in Java 7.

 

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: