TippingPoint Zero Day Initiative
 

Oracle Java JOGL NEWT Reflection Remote Code Execution Vulnerability

ZDI-12-045: March 20th, 2012

CVSS Score

Affected Vendors

Affected Products

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the NEWT library due to the way that one of its classes uses reflection in its main method. When the class is used as the main-class in a JNLP file, this vulnerability can allow an attacker to call the main method of any trusted class with arbitrary arguments and with a trusted call stack, which in some cases can lead to execution of arbitrary code. The NEWT library can be installed without warnings because it is signed with a valid certificate recognized by the java install.

Vendor Response

Oracle has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2011-11-26 - Vulnerability reported to vendor
    2012-03-20 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    Chris Ries