Linked by David Adams on Tue 12th Jul 2011 19:08 UTC, submitted by HAL2001
Privacy, Security, Encryption ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the application loading an executable file in an insecure manner when an out of memory condition occurs.
Thread beginning with comment 480551
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[2]: Nice
by WorknMan on Tue 12th Jul 2011 21:44 UTC in reply to "RE: Nice"
Member since:

Then you're not on Windows, I guess? Considering you're such a security nut. Or you're just a person with a personal grudge against Java.

Well, Windows itself is not inherently insecure, unless you run insecure programs, like Java. For this reason, I don't run Java at all, and only Flash when absolutely necessary, with Flashblock turned on at all times, except for a handful of sites that I have whitelisted.

(Of course, Java itself isn't actually a program if you want to get technical about it, which makes it even worse.)

Edited 2011-07-12 21:45 UTC

Reply Parent Score: 0

RE[3]: Nice
by ebasconp on Tue 12th Jul 2011 22:42 in reply to "RE[2]: Nice"
ebasconp Member since:

Could you please elaborate more on why do you think Java is so insecure for your mission critical computer?

Java, as any application, may have its security holes, but as someone told before, Java is just a process, same as your freecell.exe or your winword.exe and the capacity of damage it has is the same than the capacity of damage the user that launches it has.

So, if you run your Java apps as an administrator or as a user with elevated privileges, Java is not the problem, but you! ;)

But, I do not know, please elaborate more.

(if you do not consider Java to be a program (process, application, etc.)... then you are more dangerous for your computer than Java itself ;) )

Edited 2011-07-12 22:43 UTC

Reply Parent Score: 3

RE[4]: Nice
by Neolander on Wed 13th Jul 2011 07:51 in reply to "RE[3]: Nice"
Neolander Member since:

May I try ?

Java is an interpreter, and current OS security models are not designed to explicitly support interpreters. For the OS, an interpreter is just a black box executing arbitrary code from the wild.

What this means in turn is that Java may only run code as privileged as the Java interpreter is. So the Java interpreter must run with privileges that are as high as possible. No true OS-level sandboxing is possible.

Which means that the JRE is a huge mass of code (basically reinventing the system API for the sake of portability) running in a highly permissive security environment, without DEP/NX protection. As lots of code is statistically synonymous of lots of bugs/exploits, this is a disaster waiting to happen.

(Of course, if good OS-level support for interpreters was provided one day, the extreme case being an interpreted OS like Singularity, this argument would be void. Also, this is less of a problem for interpreters which maximize use of the system API instead of re-implementing everything, like C#/.Net on Windows)

(EDIT : And you'll probably say that we don't even use sandboxing for normal user apps currently, making even freecell.exe able to wipe the user's home if exploited. Current desktop security sucks really badly. But to the best of my knowledge, all current OSs have some form of support for apps that voluntarily sandbox themselves, which is probably what you'll want to use on your mission critical computer.)

Edited 2011-07-13 08:02 UTC

Reply Parent Score: 1

RE[3]: Nice
by JAlexoid on Wed 13th Jul 2011 14:31 in reply to "RE[2]: Nice"
JAlexoid Member since:

If you wan't Java to be secure, then turn on Java security. Otherwise, you could just read up what this "hubbub" is really all about. Critical is only the title of the poorly written post...

Java is no less secure than .NET in this instance.

Reply Parent Score: 2