iTnews
  • Home
  • News
  • Technology
  • Security

Zero day Java flaw opens up all users to attack

By Iain Thomson on Apr 11, 2010 8:22PM
Zero day Java flaw opens up all users to attack

Oracle's view is that it's no big deal.

Security researchers have warned of a flaw in Java that could allow malware writers to inject code onto user's machines.

The flaw is in the Java Web Start system built for developers with every version since Java 6 Update 10. The code contains a NPAPI plugin and ActiveX control called "Java Deployment Toolkit" which doesn't check the full parameters of URLs.

"The toolkit provides only minimal validation of the URL parameter, allowing us to pass arbitrary parameters to the javaws [Java Web Start] utility, which provides enough functionality via command line arguments to allow this error to be exploited," Tavis Ormandy wrote on the Full Disclosure mailing list.

"The simplicity with which this error can be discovered has convinced me that releasing this document is in the best interest of everyone except the vendor."

Ormandy said that the flaw opened up all Windows users of Java to attack. He published his findings because Oracle considered the bug not important enough to break its quarterly patching schedule.

“Sun has been informed about this vulnerability, however, they informed me they do not consider this vulnerability to be of high enough priority to break their quarterly patch cycle,” he posted.

“For various reasons, I explained that I did did not agree, and intended to publish advice to temporarily disable the affected control until a solution is available.”

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
enoughflawjavasecuritysoftware

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Iain Thomson
Apr 11 2010
8:22PM
0 Comments

Related Articles

  • Coming Microsoft API change will break third-party device authentication
  • Log4j vulnerabilities remain 'endemic', says US DHS
  • Apple introduces Lockdown Mode as it battles spyware firms
  • GitLab races out vulnerability-fix release
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.