Linked by David Adams on Tue 12th Jul 2011 19:08 UTC, submitted by HAL2001
Privacy, Security, Encryption ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the application loading an executable file in an insecure manner when an out of memory condition occurs.
Thread beginning with comment 480716
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[5]: Nice
by moondevil on Wed 13th Jul 2011 12:02 UTC in reply to "RE[4]: Nice"
moondevil
Member since:
2005-07-08

May I try ?

Java is an interpreter, and current OS security models are not designed to explicitly support interpreters. For the OS, an interpreter is just a black box executing arbitrary code from the wild.


Java is a programming language. Unless you are referring to a specific implementation I fail to see which Java is an interpreter.

Regarding implementations, Sun JVM is a JIT since version 1.3. You can force fully JIT by setting the interpretation threshold to 0.

GCJ compiles Java to binary code.

Excelsior JET compiles Java to native code.

Other comercial JVMs like JRocktIT and IBM JVM follow similar JIT compilation methods like Hotspot.

Reply Parent Score: 2