2 Years Later, Java Security Still Broken By Faulty Oracle Patch 41
An anonymous reader writes: A faulty security patch has left Java users vulnerable to attacks in the past two years, researchers from Polish security firm Security Explorations are claiming. The issue in question is CVE-2013-5838, which was discovered and patched in October 2013. Two years later, going back over their researcher, the same security researchers have now discovered that Oracle had not only misclassified its impact but also botched the fix. In a Full Disclosureexposé, the researcher says that changing four characters in the company's original proof-of-concept code allowed them to exploit the flaw, despite Oracle's patch.
Again? (Score:4, Interesting)
This is for Applets/JWS, doesn't really matter (Score:3)
This vulnerability only applies to Applets or Java Web Start- SANDBOXED environments. It doesn't matter for any real-world scenario- server apps or desktop apps or Android apps.
Thing is, sandboxed java is insecure, and by this point it's obvious it's pretty much impossible to secure. So applets or JWS will remain insecure, but they should not be used in the first place and they are barely used in real world anyway these days. Today java is used in BigData/backend/server-side/web-server apps, or in
Re: (Score:3)
Just consider that running Applets/JWS is just like running a desktop application. Forget about the security manager and its setting in Applets/JWS. Just assume an "allow all" configuration.
Then, there is still a use for Applets/JWS when you trust the provider as you would trust him to install a desktop application coming from him. Code signing and signature verification is available in both cases. From that perspective, you can still deploy your desktop application through JWS if you wish without any addit
Java security is not broken! (Score:5, Interesting)
FTA "... a sandbox exploit for Java Web Start applications and Java applets."
Great, just label it all "Java", shall we?
Never mind that neither the JREs nor server JDKs running countless web applications around the world are vulnerable. Never mind that Android is not vulnerable just for using Java. Ignore the existence of OpenJDK entirely.
Just say it's a critical flaw in "Java" security. FFS.
PS Don't use Java Web Start or Applets.
Re: (Score:1, Interesting)
PS Don't use Java Web Start or Applets.
Yeah, but that shit was installed and enabled by default for the longest time with what we call "Java", and being that the exploit targets the web facing Java code, it's all the more exploitable and dangerous.
BTW, are you an Oracle shill? Java is shit, shit. Tripple shit, has always been shit, the register VM design bogus and less efficient than even old ass VMS. Eat dick Sun / Oracle. Java is dead. Android converts Java code into Davlik, and compiles on install into [mostly] machine code (not to menti
Re: (Score:1)
, the register VM design bogus
Shit, I meant Java's STACK based VM is bogus. Register VM, as in Davlik et. al. is god-tier.
Re:Java security is not broken! (Score:5, Insightful)
With regard to your "Java is shit, shit" you are talking nonsense and should take some deep breaths. Really, grow up. And the rude words don't add gravitas either.
I use and have used many languages over the last 40 years, 30 professionally, and while Java is not perfect *NOR IS ANYTHING ELSE*. I'm having to use C/C++/ASM again at the moment and would much prefer the inherent safety against, for example, buffer overflows from coding errors of Java, but the run-time is too expensive for my current main application.
Rgds
Damon
Re: (Score:2)
So, you think I'm American for a start?
Re: (Score:2)
Well, I guess if mere actual facts don't get in your way, life is so much more simple...
Anyway, no more feeding the trolls for me today.
Re: (Score:2, Troll)
Java is shit, shit. Tripple shit, has always been shit... Android converts Java code into Davlik
BS! Dalvik is just another implementation of Java VM. Android apps are Java -- java language, java API, java VM concepts/features. Just having a different VM implementation does not negate the fact that it's java code. Stop appropriating other people's technology, making small changes, relabeling it and calling it new and novel.
Re: (Score:1)
Wow, where to begin.
Dalvik has been discontinued. Womp womp.
RISC architectures can certainly have their stacks smashed. You don't understand (a) what a stack-based architecture (e.g. x86) is versus a load-store architecture (e.g. SPARC) is and (b) what stack-smashing actually is.
If you had a good understanding about these topics, you wouldn't say such stupid things.
Java (the language) is fairly good, if not quite as expressive as some of the more recent, trendy languages. The JVM itself is actually VERY wel
Re: (Score:2)
X86 isn't a stack-based architecture, those architectures are called stack machines which - again - the x86 isn't an example of.
Very few computers doesn't have stack support either in hardware or as a software convention as it helps make things like re-entrant calls possible.
Java fail? That's unpossible! (Score:3)
It runs in a virtual machine and my Oracle rep tells me those are bulletproof!
Larry Ellison (Score:1)
is the single worst human being on the entire face of the earth.
I don't use his software, and neither should anyone else.
CAPTCHA: Opulent. You can't make this shit up....
Sun, come back! (Score:1)
I wish Sun Microsystems hadn't been sold to Oracle. It was necessary, but still it's a pity.
A lot of smart people were at Sun. James Gosling, Jon Bosak, ... I hate to see collections of really smart people get broken up.
Re: (Score:2)
Maybe. But I still wish Java had non-object structs. I like being able to save binary images to disk without a bunch of serialization...and pull them back without a bunch of deserialization.
For that matter, if they're going to add so many features into the language, why don't they add a persistent storage B+Tree. I rarely need or want SQL, but a built in B+Tree would be immensely useful. And I don't mean one elaborated the way libdb (SleepyCat) is...more like the way it was, only built into the languag
18 years later, /. still posts nonsense (Score:5, Informative)
18 years later and /. still allows nonsensical titles on its front page.
Java is a bloody language, not a thing that breaks your computer.
Overview
Unspecified vulnerability in Oracle Java SE 7u25 and earlier, and Java SE Embedded 7u25 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
Description
Per http://www.oracle.com/technetw... [oracle.com] 'Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.'
Java is mostly used as a language and runs on server side JVMs, not in people's browsers.
Oracle, however, is a piece of shit company and its incompetence is legendary, it is a truly sad situation and as I wrote years ago, I bet the likes of IBM and Google are sorry now that they didn't manage to buy out SUN's assets before Oracle did.
successfully exploited in a server env and GAE (Score:1)
You didn't read the article didn't you?
Oct 2013 indicated that Issue 69 could "be
exploited only through sandboxed Java Web Start applications and sandboxed
Java applets". This is not true. We verified that it could be successfully
exploited in a server environment as well such as Google App Engine for
Java [4].
Thank you.
Re: (Score:2)
18 years later and /. still allows nonsensical titles on its front page.
People don't like change.
big deal (Score:2, Flamebait)