what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Java SE Critical Patch Update

Java SE Critical Patch Update
Posted Oct 22, 2012
Authored by Adam Gowdiak | Site security-explorations.com

On Oct 16, 2012, Oracle corporation released Java SE Critical Patch Update, which incorporated fixes for 19 security issues that Security Explorations reported to the company earlier this year. This included a fix for a serious issue found shortly after the out-of-band patch was released by Oracle on Aug 30, 2012. This is yet another update to the saga of SE-2012-01.

tags | advisory, java
SHA-256 | 6b5435fb50ec423d0d75cecaf2ec4e9f387a00115a379abfa7af4f7c3ac321d8

Java SE Critical Patch Update

Change Mirror Download

Hello All,

On Oct 16, 2012, Oracle corporation released Java SE Critical Patch
Update [1], which incorporated fixes for 19 security issues that we
reported to the company earlier this year. This included a fix for
a serious Issue 32 [2] found shortly after the out-of-band patch was
released by Oracle on Aug 30, 2012.

What's important to note is that this update did not incorporate the
fix for Issue 50 [3] reported to the company on Sep 25, 2012 and that
affected all Java versions 5, 6 and 7 (versions 1.4 and 8 were also
verified to be vulnerable afterwards).

At the time of reporting Issue 50 to Oracle, we were not sure whether
the company would be able to address it by the Oct 2012 Java SE CPU
date. We at least hoped so. According to information received from
Oracle, the company planned to address issue 50 in Feb 2013. The fact
that Oracle decided to stick to its semi-quarter patch release cycle
was not understandable for us at all.

So, we have been exchanging emails with Oracle recently in order to
find out the reasons behind company's decision to wait with a patch
for a critical Java security issue for another four months. A summary
of that communication starting Oct 10, 2012 can be seen at our vendor
status page:

http://www.security-explorations.com/en/SE-2012-01-status.html

In general, Oracle's response was that their Critical Patch Updates
go through an extensive integration testing with other products such
as JRockit, Weblogic Server, and E-Business Suite and that any delay
in Oct Java SE CPU would result in a delay to deliver 139 fixes for
applications integrating Java SE. The company was in final stages of
extensive testing of October 2012 Java SE CPU when it received Issue
50 report. Upon evaluation of Issue 50 and the options to fix it,
company's assessment was that it was too late to include fixes in the
October Java SE CPU.

We might understand all of the above. But still, does it really take
more than four months (almost five if counting from Sep 25, 2012) to
fix a critical issue in Java ?

So, we decided to verify Oracle's claims on our own and conducted a
small Vulnerability Fix Experiment. We simply decided to see how hard
it is to fix Issue 50 and what it takes to accomplish it.

This experiment has lead us to the following conclusions:
- a fix for Issue 50 can be implemented within half an hour time
(start time 22:37 is the time of the OpenJDK 7 source code tarball
download, end time 23:03 is the time of the "application" of the fix
to JRE 7 installation directory).
- only 25 characters needed to be changed (removed / added) in a source
code in order to implement the fix,
- the fix does not seem to require any integration tests with other
Oracle application software (code logic is not changed at all,
minor changes are applied to the code, none of them influence
what could be described as an externally visible scope affecting
3rd party applications).

We provided Oracle corporation with the results of our analysis on
Oct 19, 2012.

We hope our quick experiment sufficiently challenges the company
and that it leads to the verification of Oracle's stance, especially
the one relying on a need for four additional months to implement
and release a security update for a critical security issue in Java
(Issue 50), which we believe (and are hopefully correct with respect
to the analysis conducted) can be addressed within less than 30 min.

Thank you.

Best Regards
Adam Gowdiak

---------------------------------------------
Security Explorations
http://www.security-explorations.com
"We bring security research to the new level"
---------------------------------------------

References:
[1] Oracle Java SE Critical Patch Update Advisory - October 2012

http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
[2] [SE-2012-01] New security issue affecting Java SE 7 Update 7
http://seclists.org/fulldisclosure/2012/Aug/388
[3] [SE-2012-01] Critical security issue affecting Java SE 5/6/7
http://seclists.org/fulldisclosure/2012/Sep/170


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close