Sun in hot water over Java security hole

Sun Microsystems has disclosed a serious vulnerability in the Java Plug-in technology within the Software Developers' Kit (SDK) and the Java Run-time Environment (JRE) that allows attackers to bypass the Java sandbox and Java applet security.

The specific problem exists within the access controls of the Java-to-Javascript data exchange in web browsers that use Plug-in technology, and lets Javascript to load an unsafe class -- something usually impossible. As a result, a remote attacker could execute hostile applets to access, download, upload or execute arbitrary files, as well as access the Java Virtual Machine user's network.

"If someone has found interaction between the Javascript running within the HTML on your webpage and a Java applets, it's very serious, as the script can now command the applet to do something its shouldn't," commented Bruno Beloff, technical director at ASP Class Calendar. Most seriously, he went on, "I see no mechanism whereby someone using Plug-ins can be notified to collect a fix."

The episode is potentially damaging for Sun. Its CEO Scott McNealy has repeatedly emphasized the secure nature of Java in comparison to Microsoft's alternatives. "When was the last time you heard of a Java virus?" he asked an audience in Berlin at the end of last year.

Beloff said McNealy's claims for Java were "reasonable, because it was designed to be more secure, and it's a good design." He added that the idea of the sandbox, put forward by Sun in the mid-90s to enable applets to run within protected environments, was "very good from the security point of view" and one which, at the time, had distinguished Java applets from rival technologies such as Microsoft's COM components.

In disclosing the vulnerability, Sun says there is no workaround, and recommends that users of SDK and its JRE subset move to versions 1.4.2_06 and later or 1.3.1_13 and later -- both of which are available from java.sun.com.

Security intelligence company iDefense, on the other hand, says "disabling Java or JavaScript will prevent exploitation as the vulnerability relies on the data transfer between the two components." Worse still, it goes on to point out that "other Java Virtual Machines, such as the Microsoft VM, are available and can be used as an alternative".

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Rik Turner

Techworld.com
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?