Re: JDK7 vulnerability
Re: JDK7 vulnerability
- Subject: Re: JDK7 vulnerability
- From: Alexis Tual <email@hidden>
- Date: Fri, 31 Aug 2012 10:15:58 +1100
I saw that this week, interesting explanation of the exploit :
http://www.kb.cert.org/vuls/id/636312Oracle Java 1.7 provides an execute() method for _expression_ objects, which can use reflection to bypass restrictions to the sun.awt.SunToolkit getField() function, which operates inside of a doPrivileged block. The getField() function also uses the reflection method setAccessible() to make the field accessible, even if it were protected or private.
By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the the setSecurityManager()
function to allow full privileges, without requiring code signing. Both
the Oracle JRE 1.7 and the OpenJDK JRE 1.7 are affected.
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Webobjects-dev mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden