Advisory Details

June 6th, 2012

Oracle Java GlueGen Arbitrary Native Library Loading Remote Code Execution Vulnerability

ZDI-12-081
ZDI-CAN-1474

CVE ID
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Oracle
AFFECTED PRODUCTS Java Runtime
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists in the Java GlueGen library. This library is not installed by default with Java, but it is available as a signed .jar package. The affected jar files are signed with a certificate that is trusted by default JRE installs and as such are downloaded and run without user interaction. Crafted Java applets can reach a call to 'openLibraryGlobal' in the GlueGen library that allow remote .dll files to be loaded into the JRE process. This can lead to remote code execution under the context of the current process.

ADDITIONAL DETAILS Oracle has issued an update to correct this vulnerability. More details can be found at:
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
DISCLOSURE TIMELINE
  • 2011-12-22 - Vulnerability reported to vendor
  • 2012-06-06 - Coordinated public release of advisory
CREDIT Chris Ries
BACK TO ADVISORIES