Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Extremely critical

Oracle Java Three Vulnerabilities

-

Release Date:  2012-08-27    Last Update:  2012-12-24    Views:  120,710

Secunia Advisory SA50133

Where:

From remote

Impact:

System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Three vulnerabilities have been reported in Oracle Java, which can be exploited by malicious people to compromise a user's system.

1) An error in how the "setSecurityManager()" function can be called can be exploited by an applet to set its own privileges to e.g. allow downloading and executing arbitrary programs.

NOTE: This is currently being actively exploited in targeted attacks.

2) An error when handling reflections within the java.beans.Expression class can be exploited to compromise a user's system.

3) An unspecified error in the Beans sub-component can be exploited to compromise a user's system.

Successful exploitation of the vulnerabilities allows execution of arbitrary code, but applies to client deployment only as the vulnerabilities are exploited through untrusted Java Web Start applications and untrusted Java applets.


Solution:
Update to version 7 Update 7.

Further details available to Secunia VIM customers

Provided and/or discovered by:
2) James Forshaw (tyranid) via ZDI

Reported as a 0-day.

The vendor also credits Adam Gowdiak, Security Explorations.

Original Advisory:
Oracle:
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html
https://blogs.oracle.com/security/entry/security_alert_for_cve_20121

FireEye:
http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html

ZDI:
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0214.html

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Oracle Java Three Vulnerabilities

User Message
Lanan_Makz RE: Oracle Java Unspecified Code Execution Vulnerability
Member 28th Aug, 2012 09:23
Score: -21
Posts: 22
User Since: 15th Jun 2011
System Score: N/A
Location: UA
Last edited on 28th Aug, 2012 09:23
Exploit added: http://www.metasploit.com/modules/exploit/multi/br...
Was this reply relevant?
+0
-0
Maurice Joyce RE: Oracle Java Unspecified Code Execution Vulnerability
Handling Contributor 28th Aug, 2012 10:19
Score: 11312
Posts: 8,728
User Since: 4th Jan 2009
System Score: N/A
Location: UK
This more detailed explanation may help those who use Oracle JAVA.

http://krebsonsecurity.com/2012/08/attackers-pounc...

--
Maurice

Windows 7 SP1 64 Bit OS
HP Intel Pentium i7
IE 11 for Windows 7 SP1
16GB RAM
Was this reply relevant?
+0
-0
GDHSteve RE: Oracle Java setSecurityManager Arbitrary Permissions Vulnerability
Member 30th Aug, 2012 20:09
Score: 0
Posts: 2
User Since: 26th Jul 2010
System Score: N/A
Location: US
Last edited on 30th Aug, 2012 20:10
Oracle website lists update 7.7 available for download. Does the update fix the reported vulnerability?
Was this reply relevant?
+0
-0
ddmarshall RE: Oracle Java Unspecified Code Execution Vulnerability
Dedicated Contributor 30th Aug, 2012 21:31
Score: 1172
Posts: 940
User Since: 8th Nov 2008
System Score: 100%
Location: UK
Yes. According to the Release notes, it fixes CVE-2012-4681.

http://www.oracle.com/technetwork/java/javase/7u7-...

--
This answer is provided “as-is.” You bear the risk of using it.
Was this reply relevant?
+0
-0
ingber RE: Oracle Java Three Vulnerabilities
Member 2nd Sep, 2012 17:31
Score: 1
Posts: 6
User Since: 26th Nov 2008
System Score: N/A
Location: N/A
Last edited on 2nd Sep, 2012 17:31
Shouldn't this be updated? Java 7 version 7 is STILL not secure!
Was this reply relevant?
+0
-0
ky331 RE: Oracle Java Unspecified Code Execution Vulnerability
Member 2nd Sep, 2012 19:57
Score: -1
Posts: 10
User Since: 4th Apr 2008
System Score: N/A
Location: US
Last edited on 2nd Sep, 2012 19:59
Yes, it is true that Java 7 update 7 has already been found to be insecure:

http://www.forbes.com/sites/andygreenberg/2012/08/...

http://www.pcworld.com/businesscenter/article/2617...

However, it's the latest version currently available, and as such, is presumably better to have than earlier versions --- provided you have an actual need for Java.

Many people are finally realizing that Java is less common online than they had been led to believe. I went Java-free about two years ago, and have not regretted that decision.
The Secunia Online Software Inspector (OSI) uses Java
http://secunia.com/vulnerability_scanning/online/
but the Secunia Personal Software Inspector (PSI) does not (it uses Flash instead).
Was this reply relevant?
+0
-0
E.Jeppesen RE: Oracle Java Unspecified Code Execution Vulnerability
Secunia Official 3rd Sep, 2012 12:09
Score: 220
Posts: 618
User Since: 24th Nov 2008
System Score: N/A
Location: Copenhagen, DK
(unknown source)

but the Secunia Personal Software Inspector (PSI) does not (it uses Flash instead).


Actually the PSI works fine without Adobe Flash Player. For the exact system requirements please see this page:
http://secunia.com/products/consumer/PSI/sys_req/

Cansonnu

RE: Oracle Java Three Vulnerabilities
[+]
This reply has been deleted

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability