Security researchers attack "inconsistent" Oracle over Java
By Stewart Mitchell
Posted on 18 Mar 2013 at 11:10
A security research company has attacked Oracle over the software maker's response to yet another security concern.
Security Explorations claims to have discovered a security flaw in the Java SE platform, but says Oracle has dismissed its concerns, saying the weakness is "allowed behaviour" for code.
The gripe concerns a potential weakness tagged Issue 54, which the security researchers claim can be used as part of a package to bypass sandboxing in Java.
"Described Issue 54 is not sufficient to implement a functional and successful attack code in the environment of Java SE 7," Security Explorations said in its announcement. "Security Explorations discovered another issue (number 55) affecting Oracle’s Java SE 7 that allows to do this.
A general rule in security is that same circumstances and constraints should lead to consistent security access related decisions
"Issues 54 and 55, when combined together can be used to successfully achieve a complete Java security sandbox bypass in a target system. Proof of concept code illustrating the impact of both vulnerabilities has been successfully tested in the environment of Java SE 7 Update 15 and Java SE 7 Update 17."
Oracle said allowing code to access an element of the software called Method Handle was normal procedure, but according to the researchers other examples of similar attacks were blocked, leading to a lack of consistency in policy.
"A general rule in security is that same circumstances and constraints should lead to consistent security access-related decisions," the researchers argue. "In case of Issue 54, resolving protected members of superclasses should be either always allowed or denied for all code paths available to untrusted code."
Oracle has yet to respond to a request for comment.
Is your business a social business? For helpful info and tips visit our hub.
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- Apple Watch, iPhone 6 and 6 Plus: Tim Cook's Apple back with a bang?
- BT Home Hub 5: how to get maximum speed
- 20 years of PC Pro: one-star reviews (including "the worst tablet we've ever seen")
- 20 years of PC Pro: our best covers
- Why we've closed the PC Pro forums
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords