Security researchers attack "inconsistent" Oracle over Java
By Stewart Mitchell
Posted on 18 Mar 2013 at 11:10
A security research company has attacked Oracle over the software maker's response to yet another security concern.
Security Explorations claims to have discovered a security flaw in the Java SE platform, but says Oracle has dismissed its concerns, saying the weakness is "allowed behaviour" for code.
The gripe concerns a potential weakness tagged Issue 54, which the security researchers claim can be used as part of a package to bypass sandboxing in Java.
"Described Issue 54 is not sufficient to implement a functional and successful attack code in the environment of Java SE 7," Security Explorations said in its announcement. "Security Explorations discovered another issue (number 55) affecting Oracle’s Java SE 7 that allows to do this.
A general rule in security is that same circumstances and constraints should lead to consistent security access related decisions
"Issues 54 and 55, when combined together can be used to successfully achieve a complete Java security sandbox bypass in a target system. Proof of concept code illustrating the impact of both vulnerabilities has been successfully tested in the environment of Java SE 7 Update 15 and Java SE 7 Update 17."
Oracle said allowing code to access an element of the software called Method Handle was normal procedure, but according to the researchers other examples of similar attacks were blocked, leading to a lack of consistency in policy.
"A general rule in security is that same circumstances and constraints should lead to consistent security access-related decisions," the researchers argue. "In case of Issue 54, resolving protected members of superclasses should be either always allowed or denied for all code paths available to untrusted code."
Oracle has yet to respond to a request for comment.
Is your business a social business? For helpful info and tips visit our hub.
- Windows 8.1 Update: an abject surrender
- The insane economics of Sky Now TV
- No such thing as a free app... so pay up if you want quality
- Time to outlaw crapware-laden installers
- Windows Phone 8.1 video: hands-on
- Office for iPad: key information
- Why every PC buyer owes Richard Durkin a debt of gratitude
- HTC One M8 vs Samsung Galaxy S5: 2014's big-hitters compared
- Windows XP end of life: key information
- Cut out the broadband jargon? What jargon?
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords