DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts

DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts (http://www.dreamteamdownloads1.com/index.php)
-   Piracy/LEGAL/Hackers/SPIES/AI /CRYPTO/Scams & Internet News (http://www.dreamteamdownloads1.com/forumdisplay.php?f=276)
-   -   New Java Flaw Allows “Complete” Bypass of Security Sandbox (http://www.dreamteamdownloads1.com/showthread.php?t=235748)

Ladybbird 04-10-12 15:50

New Java Flaw Allows “Complete” Bypass of Security Sandbox
 
Yet another Java flaw allows “complete” bypass of security sandbox

Flaw in last three Java versions, 8 years worth, puts a billion users at risk.

by Ars Technica

http://cdn.arstechnica.net/wp-conten...2/09/java.jpeg
Java gets exposed, yet again.

Researchers have discovered a Java flaw that would let hackers bypass critical security measures in all recent versions of the software. The flaw was announced today by Security Explorations, the same team that recently found a security hole in Java SE 7 letting attackers take complete control of PCs. But this latest exploit affects Java SE 5, 6, and 7—the last eight years worth of Java software.

“The impact of this issue is critical—we were able to successfully exploit it and achieve a complete Java security sandbox bypass in the environment of Java SE 5, 6, and 7,” Adam Gowdiak of Security Explorations wrote, claiming the hole puts "one billion users" at risk.

Gowdiak wrote that Security Explorations successfully pulled off the exploit on a fully patched Windows 7 32-bit computer in Firefox, Chrome, Internet Explorer, Opera, and Safari. Although testing was limited to Windows 7 32-bit, Gowdiak told Computerworld that the flaw would be exploitable on any machine with Java 5, 6, or 7 enabled (whether it’s Windows 7 64-bit, Mac OS X, Linux, or Solaris).

The bug lets attackers violate the “type safety” security system in the Java Virtual Machine. “A malicious Java applet or application exploiting this new issue could run unrestricted in the context of a target Java process such as a Web browser application,” Gowdiak told Computerworld. “An attacker could then install programs, view, change, or delete data with the privileges of a logged-on user.”

Gowdiak and his team have found a total of 50 Java flaws. While this latest one apparently isn’t being exploited in the wild yet, another that was being exploited was patched by Oracle last month, reportedly four months after Oracle learned of the vulnerability.

Gowdiak reported today that he provided Oracle with a technical description of the latest flaw, as well as “source and binary codes of our Proof of Concept code demonstrating a complete Java security sandbox bypass in the environment of Java SE 5, 6, and 7.”


All times are GMT. The time now is 18:51.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.5.2