- Details
-
Created on Friday, 31 August 2012 11:01
Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code on the underlying system.
Security Explorations sent a report about the vulnerability to Oracle on Friday together with a proof-of-concept exploit, Adam Gowdiak, the security company's founder and CEO said Friday via email.
The company doesn't plan to release any technical details about the vulnerability publicly until Oracle addresses it, Gowdiak said.
Oracle broke out of its regular four-month patching cycle on Thursday to release Java 7 Update 7, an emergency security update that addressed three vulnerabilities, including two that were being exploited by attackers to infect computers with malware since last week.
Java 7 Update 7 also patched a "security-in-depth issue" which, according to Oracle, was not directly exploitable, but could have been used to aggravate the impact of other vulnerabilities.
The patching of that "security-in-depth issue," which Gowdiak calls an "exploitation vector," rendered all of the proof-of-concept (PoC) Java Virtual Machine (JVM) security bypass exploits previously submitted by the Polish security firm to Oracle, ineffective.
According to Gowdiak, Security Explorations privately reported 29 vulnerabilities in Java 7 to Oracle back in April, including the two that are now actively exploited by attackers.
The reports were accompanied by a total of 16 proof-of-concept exploits that combined those vulnerabilities to fully bypass the Java sandbox and execute arbitrary code on the underlying system.
The removal of the getField and getMethod methods from the implementation of the sun.awt.SunToolkit class in Java 7 Update 7 disabled all of Security Explorations' PoC exploits, Gowdiak said.
However, this only happened because the "exploitation vector" was removed, not because all vulnerabilities targeted by the exploits were patched, Gowdiak said.
The new vulnerability discovered by Security Explorations in Java 7 Update 7 can be combined with some of the vulnerabilities left unpatched by Oracle to achieve a full JVM sandbox bypass again.
"Once we found that our complete Java sandbox bypass codes stopped working after the update was applied, we looked again at POC codes and started to think about the possible ways of how to fully break the latest Java update again," Gowdiak said. "A new idea came, it was verified and it turned out that this was it."
Gowdiak doesn't know when Oracle plans to address the remaining vulnerabilities reported by Security Explorations in April or the new one submitted by the security company on Friday.
It's not clear if Oracle will release a new Java security update in October as it previously planned. Oracle declined to comment.
Security researchers have always warned that if vendors take too much time to address a reported vulnerability it might be discovered by the bad guys in the meantime, if they don't already know about it.
It happened on multiple occasions for different bug hunters to discover the same vulnerability in the same product independently and this is what might have also happened in the case of the two actively exploited Java vulnerabilities that were addressed by Java 7 Update 7.
"Independent discoveries can never be excluded," Gowdiak said. "This specific issue [the new vulnerability] might be however a little bit more difficult to find."
Based on the experience of Security Explorations researchers with hunting for Java vulnerabilities so far, Java 6 has better security than Java 7. "Java 7 was surprisingly much easier for us to break," Gowdiak said. "For Java 6, we didn't manage to achieve a full sandbox compromise, except for the issue discovered in Apple Quicktime for Java software."
Gowdiak has echoed what many security researchers have said before: If you don't need Java, uninstall it from your system.
- Details
-
Created on Friday, 31 August 2012 10:45
It seems Apple knows what is best for you including the information you view or read. With their complete control over the products you purchase and "own" it is up to them what you can or can't do on their device. This is not anything new but simply a reminder of who really owns your computer experience. As we go forward those controls continue to get worse...here is the latest "Apple knows best" regarding application denial. Is this CENSORSHIP?
An iOS app developed to heighten awareness of the US drone war has been rejected by Apple for the third time – just three weeks after the Electronic Frontier Foundation warned that a proposed new US bill “would have broad consequences for press freedom and the public’s right to know.”
The EFF is concerned about provisions in the annual Intelligence Authorization Act that are designed to stop leaks of classified information to news reporters. EFF specifically mentions the new book by Daniel Klaidman, Kill or Capture: The War on Terror and the Soul of the Obama Presidency and its discussion on drone strikes. Yet because information is “hidden behind giant walls of secrecy, there is no oversight or accountability, and the public has no say in the decision as to whether the country should be engaging in them at all.”
Josh Begley, a New Yorker, sought to lift that veil of secrecy, not by leaking classified information but by making access to published information more effective. His app draws its source data from the freely available database compiled by The Bureau of Investigative Journalism, a not-for-profit organization based at City University in London.
The app, Drones+ (there’s a brief Vimeo video here) simply lists information about drone strikes and provides a map that shows where they occurred. It is purely factual and contains no graphics beyond the map. Nevertheless, it has now been rejected by Apple’s reviewers three times in the last month. The first rejection was apparently because it isn’t “useful or entertaining enough.” The second rejection had an issue over a logo. And the latest rejection is because Apple finds the content “objectionable and crude.”
Buster Heine in Cult of Mac comments, “We don’t see anything objectionable about the app, but apparently Apple does. What’s also concerning is that it took three rejections before Begley found out that Apple just didn’t like the content.”
Whether the timing of these rejections and the Senate deliberations on preventing leaks is anything other than co-incidence will probably never be known. Nevertheless, critics of Apple’s restrictive approach to its walled garden have long claimed that it presents a danger to free speech. Drones+ would seem to confirm that.
Unfortunately this is TRUE CENSORSHIP and only the tip of an iceberg.