what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IBM SDK 7 New Security Issues

IBM SDK 7 New Security Issues
Posted May 6, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations discovered 7 additional security issues (#62-68) in the latest version of IBM SDK, Java Technology Edition software. A majority of the new flaws are due to insecure use or implementation of Java Reflection API.

tags | advisory, java
SHA-256 | 5ee140ef4ee1fbbba3be2d987e3af93d9141d6766d1e154771745114d62a987d

IBM SDK 7 New Security Issues

Change Mirror Download

Hello All,

Security Explorations discovered 7 additional security issues (#62-68)
in the latest version of IBM SDK, Java Technology Edition software [1].
A majority of the new flaws are due to insecure use or implementation
of Java Reflection API.

Additionally to the above, we found out that four issues reported to
IBM in Sep 2012 [2] had not been fixed correctly by the company. Upon
simple exploit codes modifications they can be still used to achieve
a complete compromise of a target IBM Java environment. The problem
with IBM fixes is that they aim to detect only one specific exploit
vector (PoC instance ?) and miss many other scenarios.

Security Explorations developed reliable Proof of Concept codes for
the above-mentioned issues. Each of them demonstrates a complete IBM J9
Java VM security sandbox bypass. Each of them was verified to work in
the environment of the following version of IBM software:
* IBM SDK, Java Technology Edition, Version 7.0 SR4 FP1 for Linux (32-bit
x86), build pxi3270sr4fp1-20130325_01(SR4 FP1)

Today, a vulnerability notice was sent to IBM corporation containing
detailed information about identified weaknesses. Along with that, the
company was also provided with source and binary codes for Proof of
Concept codes illustrating all new security bypass issues and broken
fixes.

Thank you.

Best Regards
Adam Gowdiak

---------------------------------------------
Security Explorations
http://www.security-explorations.com
"We bring security research to the new level"
---------------------------------------------

References:
[1] IBM developer kits
http://www.ibm.com/developerworks/java/jdk/
[2] SE-2012-01 Vendors status
http://www.security-explorations.com/en/SE-2012-01-status.html
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close