Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Java Programming Security

Dangerous Java Flaw Threatens 'Virtually Everything' 323

Marc Nathoni writes with a ZDet article about a critically dangerous hole in the Java Runtime Environment. Due to the ubiquitousness of Java, this could prove a serious security problem. "Australia's Computer Emergency Response Team (AusCERT) analyst, Robert Lowe, warned that anyone using the Java Runtime Environment or Java Development Kit is at risk. 'Delivery of exploits in this manner is attractive to attackers because even though the browser may be fully patched, some people neglect to also patch programs invoked by browsers to render specific types of content,' said Lowe."
This discussion has been archived. No new comments can be posted.

Dangerous Java Flaw Threatens 'Virtually Everything'

Comments Filter:
  • by Anonymous Coward on Friday July 13, 2007 @11:06AM (#19848951)
    you're right, except it has little to do with java ;)
  • by nimr0d ( 312173 ) * on Friday July 13, 2007 @11:07AM (#19848967) Homepage
    Except NoScript blocks Java from any unapproved pages, effectively making it have everything to do with this article ;)
  • FUD? (Score:2, Informative)

    by DrJonesAC2 ( 652108 ) on Friday July 13, 2007 @11:08AM (#19848975)
    The article contains virtually no information about the exploit. "There's a vulnerability. And it's really scary" is about all I got out of this.
  • by 3p1ph4ny ( 835701 ) on Friday July 13, 2007 @11:09AM (#19848985) Homepage

    you're right, except it has little to do with java ;)
    Actually, NoScript has an option to block Java, Flash, and all other plugins. So it does, in fact, have something to do with Java.
  • More information (Score:3, Informative)

    by greenreaper ( 205818 ) on Friday July 13, 2007 @11:15AM (#19849099) Homepage Journal
    This CNET article [com.com] has more information. There is a vulnerability report [sun.com] at Sun. It is fixed in JDK and JRE 5.0 Update 10 or later, SDK and JRE 1.4.2_13 or later and SDK and JRE 1.3.1_19 or later.
  • Original AusCERT (Score:5, Informative)

    by didiken ( 93521 ) on Friday July 13, 2007 @11:18AM (#19849151) Homepage
    It looks like AusCERT has published on their page about this:

    Quoted from
    AL-2007.0071 -- [Win][Linux][Solaris] -- Sun Java Runtime Environment vulnerability allows remote compromise [auscert.org.au]

          1. Impact

          A buffer overflow vulnerability in the image parsing code in the Java
          Runtime Environment may allow an untrusted applet or application to
          elevate its privileges. For example, an applet may grant itself
          permissions to read and write local files or execute local
          applications that are accessible to the user running the untrusted
          applet.

          A second vulnerability may allow an untrusted applet or application to
          cause the Java Virtual Machine to hang.

          Sun acknowledges, with thanks, Chris Evans of the Google Security
          Team, for bringing these issues to our attention.

          These issues are also referenced in the following documents:

          CVE-2007-2788 at
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 2007-2788 [mitre.org]

          CVE-2007-2789 at
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 2007-2789 [mitre.org]
  • That last line should read, "serious security risk through port 80."

    I find it interesting that this team is supposedly reporting a major flaw, yet manually running the Java updater finds no new JVM versions to download. Didn't they contact Sun first? Shouldn't there be a patch already? Meh. The whole thing stinks.

    If you want to run the updater yourself, you can either right-click on the Java icon in your taskbar and select "Control Panel", or you can run the "javacpl.exe" file in the "c:\Program Files\Java\jre\bin" directory. Look under the "Update" tab to see the update schedule. Click "Update Now" to check for the lastest release.

    Mac users do not need to access a separate updater. Java updates are pushed through the standard system updates, accessible through the control panel. These are also scheduled to run on a regular basis. Only Linux/Unix users should need to manually update their JVMs if and when a patch becomes available. Some of these OSes do have a Java updater, but I don't know the current details about these.
  • This isn't new (Score:5, Informative)

    by radish ( 98371 ) on Friday July 13, 2007 @11:23AM (#19849225) Homepage
    This issue (I'll provide a link [auscert.org.au] to the AusCERT page as the summary neglected to) was first publically announced on June 4 and fully patched by June 29th. All that's happened recently is some minor updates to the ticket. Yes it's serious, but anyone paying attention to such things will have patched already.
  • Re:How...useful. :/ (Score:5, Informative)

    by shawnce ( 146129 ) on Friday July 13, 2007 @11:27AM (#19849259) Homepage
    According to CVE-2007-2788 [mitre.org] and CVE-2007-2789 [mitre.org] any version of Java before "1.5.0_11-b03" and "1.6.x before 1.6.0_01-b06".
  • by Mr. Sketch ( 111112 ) <<moc.liamg> <ta> <hcteks.retsim>> on Friday July 13, 2007 @11:27AM (#19849261)
    It's fixed in:
    * JDK and JRE 6 Update 1 or later
    * JDK and JRE 5.0 Update 11 or later
    * SDK and JRE 1.4.2_15 and later

    From:
    http://www.auscert.org.au/render.html?it=7664 [auscert.org.au]
  • Re:Original AusCERT (Score:5, Informative)

    by AKAImBatman ( 238306 ) * <akaimbatman@gmaYEATSil.com minus poet> on Friday July 13, 2007 @11:27AM (#19849265) Homepage Journal
    Oh good grief, is that all it is? A buffer overflow in images that only affects desktops and servers supporting image uploads that are not running the latest version of a given JVM? What happened to the spreading to PDAs and cell phones, the problem for all users worldwide, the end of things and mankind himself!?!

    Bunch of FUD-spreading fear-mongers. Hrumph.

    Oh, and Sun wouldn't have had this problem if they'd used pure Java code rather than relying on an existing library.
  • by dgun ( 1056422 ) on Friday July 13, 2007 @11:28AM (#19849273) Homepage

    Google Security Team

    I see at the top where they mention the Google security team. But the article quotes only someone named Chris Gatford from "penetration testing firm Pure Hacking" and someone from "Australia's Computer Emergency Response Team"

    AUSCERT ^ has issued something on this, but there is not many details. They claim the exploit is the ability for applets to escalate privileges.

    Also, someone asked, but here are the versions they claim are vulnerable, for windows and solaris.

    First vulnerability:
    * JDK and JRE 6
    * JDK and JRE 5.0 Update 10 and earlier
    * SDK and JRE 1.4.2_14 and earlier
    * SDK and JRE 1.3.1_20 and earlier

    Second vulnerability:
    * JDK and JRE 6
    * JDK and JRE 5.0 Update 10 and earlier
    * SDK and JRE 1.4.2_14 and earlier
    * SDK and JRE 1.3.1_19 and earlier

    And a link to the Aussie security alert [auscert.org.au]

  • Re:You forget... (Score:3, Informative)

    by wol ( 10606 ) on Friday July 13, 2007 @11:41AM (#19849469)
    While Lisp might be used for nuclear facilities, it is not because of lack garbage collection or because it is only interpreted. Lisp has garbage collection and while development typically takes place using the interpreter, the production program is typically compiled. I don't know Java, so I can't start a rational flamewar over why Lisp is better. (Irrational flamewars, on the other hand...)
  • Re:You forget... (Score:5, Informative)

    by JesseMcDonald ( 536341 ) on Friday July 13, 2007 @11:43AM (#19849493) Homepage

    I'm not certain but I once heard someone say that languages like Lisp are used in nuclear facilities because they are quick, stable and can be analyzed mathematically to be proved 'correct.' The garbage collector causes Java to be none of these. Also, I think that since Lisp is interpreted, you can switch a program with another modified program without losing execution or control. Not too sure on the details of that though.

    1. Lisp also makes extensive use of garbage collection, although there are real-time garbage collection algorithms for it.
    2. Most variants of Lisp are compiled, not interpreted.
    3. Despite being compiled, you can indeed update a Lisp program on-the-fly. This is accomplished through partial recompilation and dynamic linking.
  • It appears to be referring to the GIF exploit, which was patched a couple of months ago.

    No, as others have pointed out it's a flaw in JPEGs and BMP files. PNGs (pretty much the only format used in J2ME in cell phones and PDAs) are safe. Here are the advisories:

    http://www.auscert.org.au/render.html?it=7664 [auscert.org.au]
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 2007-2788 [mitre.org]
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 2007-2789 [mitre.org]

    The biggest concern is that arbitrary applets could be pushed to user's machines. This is mitigated by the fact that the latest JVM's have already been repaired. Thanks to the Java autoupdater, there should not be many desktops at risk.

    A secondary concern is servers that accept image uploads. BMPs are usually not accepted anyway, but JPEGs could be a concern. So it is best to upgrade these. Which brings us around to your concern...

    The problem is that most Java enterprise software winds up becoming tightly coupled with a specific JVM. (In Oracle's case, a good half-dozen *different* JVMs!) You can't upgrade the JVM without breaking the enterprise app (trust me, I tried, they really work only with the specific JVM shipped), so you're left with vulnerable JVMs and no way to upgrade them. I don't have a solution to that problem.

    For one, it is possible to upgrade these JVMs. It's a bit trickier than a standard install, but it can be done, at least inside the same VM version. (e.g. Java 1.4 apps will usually not suffer from an upgrade to 1.4.1, but a Java 5 upgrade would be disasterous.)

    Secondly, I *DO* have a solution. Yell at the vendor! If they're going to stupidly integrate the JVM for no reason other than to make your life difficult (ostensibly to make it easier, yeah right) then they can take the burden of getting you a patch. Don't let the vendor off the hook until they get the problem fixed! That's just good practice, nothing to do with Java.

    (Of course, a better practice is to find a vendor who doesn't stupidly integrate JVMs, but I digress.)

    BTW, are you talking about Oracle AS or Oracle Database? Oracle AS would need to be patched for situations like this just in case you handle or will handle image uploads. Oracle Database would not be at risk since there is almost no chance of the database being made to parse images in its procedural code. Desktop applications are similarly unaffected unless they download arbitrary images from the internet.
  • Re:Original AusCERT (Score:5, Informative)

    by AKAImBatman ( 238306 ) * <akaimbatman@gmaYEATSil.com minus poet> on Friday July 13, 2007 @12:01PM (#19849731) Homepage Journal

    Looks to me like the major problem is for embedded devices, where the update isn't easy.

    No, it doesn't. First off, I guarantee you that J2ME implementations do NOT use the same parsing library as the desktop JVM. It's far too heavyweight. Add to that fact that the embedded implementations are written by the phone vendor, significantly decreasing the risk.

    Secondly, J2ME does not support JPEGs or BMPs. The standard only supports PNGs. If you want to open JPEGs, you have to use a pure-Java decoder. (Which would not be vulnerable.)

    Thirdly, Java applet support is extremely limited in Symbian devices; the only devices I'm aware of that support applets. It's basically Java ME + a few extra APIs to bring it up to Java 1.1 standards. It's doubtful that these VMs even contain the APIs that are being exploited here.

    First of all, thanks to the OP for the link to AusCERT. Very, very helpful!

    Oh dear, where are my manners? I'd also like to thank the poster for finding the relevant AusCERT article. Without it, we'd still be at the FUD level. :-)
  • by AaronW ( 33736 ) on Friday July 13, 2007 @12:30PM (#19850113) Homepage
    I clicked on the update tool and it shows an update to Java 1.5. The description says:

    Update Version: 3832-0
    Category: Security

    Status: Needed

    The Sun JAVA JDK 1.5.0 was upgraded to release 12 to fix
    various bugs, including the following security bugs:

    CVE-2007-2788 / CVE-2007-3004: Integer overflow in the
    embedded ICC profile image parser in Sun Java Development
    Kit (JDK), allows remote attackers to execute arbitrary
    code or cause a denial of service (JVM crash) via a crafted
    JPEG or BMP file.

    CVE-2007-2789 / CVE-2007-3005: The BMP image parser in Sun
    Java Development Kit (JDK), on Unix/Linux systems, allows
    remote attackers to trigger the opening of arbitrary local
    files via a crafted BMP file, which causes a denial of
    service (system hang) in certain cases such as /dev/tty,
    and has other unspecified impact.

    CVE-2007-0243: Buffer overflow in Sun JDK and Java Runtime
    Environment (JRE) allows applets to gain privileges via a
    GIF image with a block with a 0 width field, which triggers
    memory corruption.
  • Re:And how? (Score:4, Informative)

    by ajs ( 35943 ) <{ajs} {at} {ajs.com}> on Friday July 13, 2007 @12:49PM (#19850323) Homepage Journal

    Wouldn't you just roll it out the same as with any other patch?
    Yes you would. Which means, a full release cycle. Most enterprises (a catch-all phrase that usually maps to the largest corporate environments, involving thousands of employees) support a range of in-house and 3rd party applications, utilities and infrastructure tools. QA on a release cycle for desktops can cost hundreds of thousands of dollars in employee time and delayed projects, but to perform the release any more cavalierly can result in even more damage.

    Most folks who've worked in small-to-medium businesses or less critical environments (such as education) simply can't comprehend the hell that is trying to coordinate a release to such a large community.
  • JVM in Java (Score:4, Informative)

    by CustomDesigned ( 250089 ) <stuart@gathman.org> on Friday July 13, 2007 @12:56PM (#19850415) Homepage Journal
    IBM produced a working demonstration system called "Jalapeno" that codes the entire JVM in Java. If you're wondering how it bootstraps, it is a JIT. So in operation the JVM either interprets bytecode or translates it to native machine code. The JIT has hooks to let a utility translate the bytecode of the JVM itself and package it as a loadable module. The demonstration system supports i386 only. The most interesting part of the project was creating a minimal number of privileged bytecodes to support things like memory management and IO.

    So if your JVM includes a JIT, it is not so farfetched for it to be "pure" Java. (The privileged bytecodes are an extension to the Java standard.) Such a design eliminates whole classes of common bugs. Unfortunately, there are infinitely many additional classes of bugs to take their place. One reason why production JVMs are still coded in C is that the code generation of mature C compilers is so much better than a first generation JIT.

  • by AtomicJake ( 795218 ) on Friday July 13, 2007 @01:12PM (#19850605)
    If you have multiple Java versions on your computer and/or you do not know which version is used by your browser, try this page:
    http://www.javatester.org/version.html [javatester.org]

    According to AusCERT, http://www.auscert.org.au/render.html?it=7664 [auscert.org.au]
    you are vulnerable, if your JRE is:
    - Sun Java Runtime Environment (JRE) 6
    - Sun Java Runtime Environment (JRE) 5.0 Update 10 and prior
    - Sun Java Runtime Environment (JRE) 1.4.2_14 and prior
    - Sun Java Runtime Environment (JRE) 1.3.1_20 and prior
  • Re:Original AusCERT (Score:4, Informative)

    by burner ( 8666 ) on Friday July 13, 2007 @01:27PM (#19850803) Homepage Journal
    Native methods are there to allow a Java program to call code that has not been written in Java, providing access to things such as platform specific functionality. It does not necessarily make your program run faster and should generally not be used to improve performance.
  • You have to have native code implementation of some methods, at some point.

    I have to admit that I have been very impressed by the overall security of Java. The design is not inherently safe, so the implementation has to be flawless, and I was extremely skeptical of this approach... but Sun has done an excellent job of implementing the Java security model in Java itself with untrusted code running in the same fully capable virtual machine as trusted code.

    This means that for untrusted code, implementing as much as possible in Java is the most secure way to go. And avoiding native OS- or application-specific extensions (like, for a recent example, animated cursors in Firefox) keeps Java from being a carrier for indirect attacks.

    There are, however, some caveats:

    First, for trusted code (for example, normal applications) avoiding native libraries has a potentially huge performance cost. I'm not talking so much about the overhead of Java itself, but portable OS- and application-independent code can't take advantage things like a native graphics API that's directly mapped to GPU operations. I'm sure you can call OpenGL from Java, but I would hope that you can't do it from a Java applet - so applications should perhaps not be held to such a strict regimen.

    Second, one of the problems with Java as a "run anywhere" language for applications is that so much of Java is implemented in Java, emulating a Windows style user interface (I don't have a problem with Sun choosing Windows here, that's where the market is, but it does make Java less attractive to people wanting to "run anywhere".

    Third, solving this problem for Java may be less useful when it comes to security than fixing the native libraries so they're secure whether they're called from Java or some other component for the display of untrusted content (like a browser).

    The flip side of this last point is that implementing a good browser purely in Java would seem to be a way to avoid that problem... but the catch-22 there is the first and second problems, plus so much of the web now *depends on* plugins like Flash, media players, and even Java itself. :)
  • not FUD (Score:3, Informative)

    by nanosquid ( 1074949 ) on Friday July 13, 2007 @01:51PM (#19851095)
    A buffer overflow in images that only affects desktops and servers supporting image uploads

    According to the announcement, it allows applets to elevate their privileges.

    Bunch of FUD-spreading fear-mongers. Hrumph.

    If applets are vulnerable, that's not FUD, it's serious. Of course, it's only the latest in several such vulnerabilities over the years, which is probably why many people just disable Java.

    Oh, and Sun wouldn't have had this problem if they'd used pure Java code rather than relying on an existing library.

    Yes, that would be the right thing to do. Unfortunately, Java sucks for writing that kind of code.
  • Naming and installer (Score:4, Informative)

    by pe1chl ( 90186 ) on Friday July 13, 2007 @02:12PM (#19851361)
    Can anyone explain why Sun changes the name of the package with every minor version?

    J2SE Runtime Environment 5.0 Update 11
    Java(TM) SE Runtime Environment 6 Update 1
    Java(TM) 6 Update 2

    What will the next update be called? J2SE Runtime Environment 6.0 Update 3?

    Installer changes every time, too. It is just inconvenient for those that want to do unattended installs.
  • by Anonymous Coward on Friday July 13, 2007 @03:00PM (#19851871)
    For Item #1:
      Java 3D, in applet form no doubt:
          Java3D API: http://java.sun.com/products/java-media/3D/forDeve lopers/J3D_1_3_API/j3dapi/index.html [sun.com]
          Java3D Applets: http://www.garybeene.com/3d/3d-j3d.htm [garybeene.com]

    For Item #2:
      Native GUI Widgets in Java:
          http://www.eclipse.org/swt/ [eclipse.org]

    For Item #3:
      Java Web Browser: http://html.xamjwg.org/java-browser.jsp [xamjwg.org]
         
  • by janrinok ( 846318 ) on Friday July 13, 2007 @03:11PM (#19851985)

    http://noscript.net/

    NoScript blocks JavaScript, Java and other executable content.

  • by matfud ( 464184 ) <matfud@yahoo.com> on Friday July 13, 2007 @06:08PM (#19853759) Homepage
    The role of JAI is to process images NOT to load/store them. It had a number of unsupported codecs for loading images because there was no decent framework in java to do so at the time. They probably should have used JIMI to loaded/store images but they did not for some reason. ImageIO was developed in parallel with JAI (actaully a bit behind).

    JAI is still in use. It is still supported (apart from the com.sun* image codecs it originally had). It is complicated to use. It is very powerful.

    matfud
  • by mwalleisa ( 561970 ) <michael.walleisa@noSpam.gmail.com> on Friday July 13, 2007 @09:28PM (#19855537)
    I completely agree with you about Sun's naming and versioning scheme (really, what's wrong with Java JRE 1.5.0_12 - it tells you what you need to know). However, I wanted to pass on some (hopefully) helpful info about the unattended installs.

    Java JRE 1.4.2 accepted the same command-line options throughout all version, and they even kept the naming scheme fairly consistent. Java JRE 1.5.0 and JRE 1.6.0 accept a slightly different set of command-line options but it is consistent throughout those releases - the naming convention was a little less consistent but it's not really a big deal for unattended software deployments. The key to managing Java deployments is to remember that by default, the JRE installer (and JDK too, IIRC) will not remove any previous versions, simply install the new one and (usually) make it the default JVM. I used to do desktop software management (Microsoft shop, SMS 2003). Our install base was a mess when I started, with literally dozens of JRE versions in use. Keeping detail to a minimum (if you're that curious, email me), once we decided on an "approved" JRE, I built a wrapper around that JRE installer that would inventory other JREs installed on the box and remove them all before installing our standard JRE. Once most of our systems had a common JRE, it was simpler to manage the upgrade process. I had our SMS deployments structured so that it would identify "out-of-date" JREs and patch them automatically. Whenever we approved a new version it was about half an hour of work on the back-end (marking that version as "current" and tweaking the advertisements). Once the new version was slurped into the hierarchy, any "out-of-date" JREs would be updated in a week (most in considerably less than that).

    FYI, the acceptable switches for JRE 1.5 and JRE 1.6 are (see this page [sun.com]):
    {some-jre.exe} [/L] /s /v"/qn [ADDLOCAL=jrecore[,extra][,other_US] | ALL] [IEXPLORER=1] [MOZILLA=1] [INSTALLDIR=:\] [REBOOT=Suppress] [JAVAUPDATE=0] [CUSTOM=1]"

    The only difference for JRE 1.4.2 is that it supported an additional parameter: [NETACAPE=1]. For 1.5 and 1.6, [MOZILLA=1] covers installing the Java plugin for both Mozilla and Netscape browsers.

    I've found this worked well for us (we actually used some of the extra fonts): {some-jre.exe} /s /v"/qn ADDLOCAL=All IEXPLORER=1 MOZILLA=1 REBOOT=ReallySuppress JAVAUPDATE=0"

    Alternatively, just extract the .MSI from the executable and deploy using the standard Windows Installer command-line parameters.

Remember to say hello to your bank teller.

Working...