Attackers have released exploit code targeting two previously patched flaws in Sun Microsystems' Java Runtime Environment (JRE) and Java Software Development Kit (SDK).
The flaws could allow an attacker to remotely execute code on a Windows, Linux or Solaris system. Sun issued patches for both vulnerabilities in December.
The vulnerabilities affect JRE 1.3.x, 1.4.x and 1.5.x, as well as versions 1.3.x and 1.4.x of the SDK and versions 1.5.x of the Java Development Kit.
Danish security vendor Secunia rates one of the vulnerabilities as 'highly critical', the company's second-highest level, owing to the possibility for remote code execution.
Eric Sites, vice president of research and development at Sunbelt Software, told vnunet.com that, although exploits against Java vulnerabilities are uncommon, they do still pop up.
"Sun has been very thorough and steady in the stuff it implements and how fast it implements it," he said.
Sites pointed out that Java is inherently a more secure system, because JRE uses so-called sandboxing that allows it to operate as a virtual machine to block access to other parts of the system.
As soon as the programs reach outside the virtual machine for system files, the security protection of the sandbox is negated.
Sites said that this latest exploit is particularly worrying, as the code could be embedded in a small Java application that launches from a browser window and could deliver a malicious payload very quickly.
New Java exploits brewing
By Shaun Nichols on Jan 15, 2007 3:08PM