- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
Computerworld - A security researcher known for finding Java bugs has uncovered a new critical zero-day vulnerability in all currently-supported versions of the popular Oracle software.
The bug, which was publicly reported on the Full Disclosure security mailing list Tuesday by Adam Gowdiak, the founder and CEO of Polish security firm Security Explorations, can be leveraged to hijack a machine equipped with Java, letting attackers install malware on the system.
Windows PCs and Macs are equally at risk if their users have installed Java, or in the case of OS X, are running 10.6, aka Snow Leopard, or earlier. Snow Leopard was the last edition where Apple bundled Java with the operating system.
All currently-support versions of Java, including Java 5, Java 6 and Java 7, contain the bug.
Gowdiak has found other Java vulnerabilities in the past: Earlier this year he reported more than a dozen to Oracle. Months later, hackers independently uncovered one of the bugs, then began using it in widespread attacks during August.
On Aug. 30 Oracle shipped one of its rare emergency, or "out-of-band," security updates to patch the exploited Java bug.
The vulnerability Gowdiak revealed Tuesday was both potentially more serious than the already-exploited flaw and less of a risk to users at the moment.
"The potential impact is bigger when it comes to the number of Java desktops," said Gowdiak in an email reply to questions. "The vulnerability affects up-to-date installs of Java 5, 6 and 7. We even tested the developer preview of Java 7 Update 10, a build from Sept. 20, 2012, [and] verified it was also vulnerable."
The Java zero-days exploited by cyber criminals last month were in Java 7 only -- the newest edition -- and because of that, Gowdiak and other experts recommended users downgrade to Java 6, which was safe.
Not the case now, as all editions of Java harbor the flaw.
Gowdiak, using installed-base statistics cited by Oracle, argued that approximately 1 billion computer users are at risk because of the unpatched vulnerability.
On the other hand, there is much less urgency with this vulnerability than the one exploited last month for the simply fact that there's no evidence it's in the hands of hackers. "We are not aware of any active attacks that would exploit this vulnerability," Gowdiak said.
While Gowdiak said that he found the new Java bug last week -- and took the weekend to create and test a proof-of-concept exploit -- he only reported it to Oracle on Tuesday. In a follow-up email to Computerworld, Gowdiak said, "We just received confirmation of the issue from Oracle."
The company also told him that the bug will be patched in a future Java security update, but that it did not name which. The next on Oracle's quarterly schedule will ship Oct. 16.
That was one of several reasons Gowdiak used to explain why he went public with the bug -- albeit sans technical details -- rather than privately reporting it to Oracle and waiting for the company to quietly patch Java. "There are still three weeks until the scheduled Java October Critical Patch Update [CPU], so it might be possible that Oracle manages to address the bug [on Oct. 16]," he said.
Originally published on www.computerworld.com. Click here to read the original story.