An in-the-wild exploit targeting a vulnerability with Java 7 has led to security experts the world over warning users to disable the Java plug-in for their browser clients at the very least, and preferably uninstall Java altogether. The CVE-2012-4681 vulnerability, comprising two flaws, along with a couple of other 'related vulnerabilities' has now been patched by Oracle which strongly recommends users apply the updates as soon as possible. Security Explorations, the Polish security company that first notified Oracle about the vulnerabilities many weeks ago, is less convinced.

javasec7 It would appear that the company has found another vulnerability in the newly patched version of Java 7. Adam Gowdiak, the Security Explorations CEO, has claimed that the new vulnerability enables a 'complete JVM sandbox bypass' within the latest Java SE 7 update 7 environment. Security experts seem to think that the reason why Oracle managed to turn around such a quick patch, within a few days of the insecurity story breaking across the Internet, is that it blocked the route to the vulnerability in order to prevent exploitation rather than actually remove the vulnerability itself. What Security Explorations seem to have discovered is a way to route around that roadblock and arrive at the same vulnerability, although it should be pointed out that there are no suggestions of any new exploits being in the wild at this time.

Some security commentators are recommending that users roll back to Java 6 which, with it's reduced feature set compared to Java 7, is not susceptible to the same vulnerability. However, given the way that this whole insecurity story is panning out so far I think that the original advice to disable any browser Java plug-ins or uninstall Java completely is a more appropriate security measure. The possibility that the bad guys might be able to bypass the Java security sandbox and execute malicious code on a target machine is just too big a risk to take.

Oracle has stated that it is analysing the Security Exploration's vulnerability report and proof of concept code, but has yet to confirm that the flaw remains. With the next Critical Patch Update for Java not scheduled until October 16th, Oracle needs to get on the case and either confirm or deny this ASAP. If the researchers turn out to be right, as they were with the original vulnerability report, then Oracle will need to produce yet another out of band update as soon as possible if it is to prevent even further reputational damage.

Edited 3 Years Ago by peter_budo: 3months old, I think we can unstick it

In a nutshell "bypass the Java security sandbox and execute malicious code on a target machine" or if you prefer the NIST more technical version (in full here):

Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.

Edited 4 Years Ago by happygeek

THe suggestion to disable Java in the browser and better yet uninstall it is just silly. When security holes are disovered in Windows, do we suggest that all users uninstall Windows? Java powers a large number of businesses and many users need Java installed to get their work done. Although Java is not very popular in the browser, when it is used in modern web apps there is often no way of using the application without using the Java applet. For instance, two of the most popular gradebook / Student management systems run over java applets or JWS. Most high schools on Long Island use one of these systems, so the suggestion to uninstall Java is certainly not being followed in schools.

Hopefully any remaining vulnerabilities will be fixed very soon, but we may have to wait until February for a more complete solution fom Oracle.

Does anyone know of an actual exploitation (virus, DDOS attack, stealing confidential data) being executed? Or is it just proof-of-concept code that was run?

I think It can underlye

And I new signer to this forum and this site can improve my knowldge

Edited 3 Years Ago by happygeek: spam (fake sig) deleted

This article has been dead for over six months. Start a new discussion instead.