Java SE

General info

In a result of its research investigation efforts, Security Explorations discovered multiple critical security vulnerabilities in Java Platform, Standard Edition.

This section of our website presents initial information regarding the project that lead to this discovery:

  • Official press statement containing general information about the impact of the vulnerabilities.
  • Frequently Asked Questions about our discovery.
  • Information about Proof of Concept codes illustrating discovered security issues.
  • Technical details of conducted attacks and security issues found.
  • Status of the communication with vendors of affected technologies.

Project newsroom

Java SE - Press Info no. 4
18
MAR 2013

Java SE - Press Info no. 4

Security Explorations decided to release technical details of Issue 54 that was reported to Oracle on Feb 25, 2013 and that was evaluated (...)

Read more
Java SE - Press Info no. 3
15
OCT 2012

Java SE - Press Info no. 3

Security Explorations founder and CEO, Adam Gowdiak will give a talk at Devoxx Java Community Conference in Antwerp [1] in Nov 2012 (...)

Read more
Java SE - Press Info no. 2
25
JUN 2012

Java SE - Press Info no. 2

Security Explorations decided to release technical details and accompanying Proof of Concept code for a security vulnerability in Apple QuickTime (...)

Read more
Java SE - Press Info no. 1
2
APR 2012

Java SE - Press Info no. 1

Security Explorations, a security and vulnerability research company from Poland, discovered multiple security issues in the latest version (...)

Read more

FAQ

Why did you look into desktop Java security?

Java has been within our interest for nearly a decade. We've been breaking it with successes since 2002 and are truly passionate about it. Regardless of the many changes that had occurred in the Rich Internet Application's [1] space, Java is still present in the vast number of desktop computers. According to some published data [2], Java is installed on 1.1 billion desktops and there are 930 million Java Runtime Environment downloads each year. These numbers speak for itself and it's actually hard to ignore Java when it comes to the security of PC computers these days.

Is it easy to break Java security?

Java is one of the most exciting and difficult to break technologies we have ever met with. Contrary to the common belief, it is not so easy to break Java. For a reliable, non memory corruption based exploit codes, usually more than one issue needs to be combined together to achieve a full JVM sandbox compromise. This alone is both challenging and demanding as it usually requires a deep knowledge of a Java VM implementation and the tricks that can be used to break its security.

How is it possible that you were able to find so many bugs in latest Java 7?

We are quite experienced when it comes to breaking Java security. We were able to spot a couple of things that were simply missed by Sun Microsystems [3] and/or Oracle. We also came up with some new ideas for the abuse of Java security.

Is there anything specific about discovered vulnerabilities?

Yes. Discovered security issues violate many "Secure Coding Guidelines for the Java Programming Language" [4]. Additionally, most of them demonstrate a specific problem related to Java SE security. This problem has its origin in certain design / implementation choices made with respect to the security architecture of a Java Virtual Machine.

Sun Microsystems had been aware of these problems since at least 2005. This was the time when we discovered specific attack techniques and reported more than 20+ security issues to the company. The more surprised we were to find so many instances of a known security problem in the latest version of Java SE software.

What is the impact of the issues found?

The most serious issues could lead to the complete compromise of a Java security sandbox. Malicious Java applet or application exploiting one of them could run unrestricted in the context of a target Java process such as a web browser application. An attacker could then install programs, view, change, or delete data with the privileges of a logged-on user.

We verified that as a result of a successful attack, arbitrary files could be created or programs executed in the environment of the affected Java SE software.

How could these issues be exploited?

In the most common web browser attack scenario, an attacker could host a specially crafted website with a malicious Java application exploiting one of the vulnerabilities found. Upon convincing the user to visit such a website, typically by getting them to click a link in an email or in an Instant Messenger message, malicious web content could be delivered to affected systems.

It could also be possible to display specially crafted web content by using banner advertisements or by using other methods to deliver web content to vulnerable systems.

Is it also possible to exploit Java SE vulnerabilities on servers?

Java SE vulnerabilities can be exploited on servers if malicious input can be supplied to a vulnerable API or server component.

We have demonstrated such a possibility in the context of Java RMI servers such as RMI Registry from JDK 7 Update 11 and Oracle GlassFish Server 3.1.2.2 (with security manager enabled). Our Proof of Concept code implements a successful attack against RMI services exposed by the abovementioned servers. It also shows that Oracle's evaluation of Java SE vulnerabilities' impact is not necessarily correct (we exploit the flaws that according to the company "can be exploited only through untrusted Java Web Start or Java applets applications" [6]).

As of Feb 05, 2013 attacks through RMI protocol are still valid and in this context remote exploitation of security vulnerabilities in Java SE on servers should be always concerned.

How reliable are your Proof of Concept codes?

Since 59 of the issues found are pure Java bugs, our Proof of Concept codes are fully reliable and should work with flying colors on any system platform with the affected Oracle Java SE or IBM Java installed. Most of them combine more than one issue together to achieve a complete Java security sandbox compromise.

There is only one vulnerability that can lead to an arbitrary memory corruption condition. We have however come up with an exploitation technique that can be successfully used for that issue to achieve a reliable code execution in a DEP / ASLR environment such as Windows 7 OS.

Which issues are being addressed by Oracle's Java Critical Patch Update from Jun 12, 2012?

These are issues 10, 13 and 21. There is also one mitigation in the code that makes our original exploitation scenario for Issue 26 not working anymore.

Which issues are being addressed by Oracle's Security Alert for CVE-2012-4681 from Aug 30, 2012?

These are Issues 11 (a part of it related to ClassFinder flaw), 16, 17, 20 and 28. There is also one mitigation in the code that makes our original exploitation scenario for a complete Java security sandbox compromise not working any more.

What's the impact of Issue 32 discovered shortly after Java SE 7 Update 7 was released?

This issue, when combined with some of our previously reported issues makes it possible again to completely escape Java 7 security sandbox. Recently, we've been also able to verify that this issue alone is sufficient for a complete compromise of Java 7 security.

Which Java SE versions are affected by Issue 50 reported to Oracle on Sep 25, 2012?

We verified that these are: Java SE 1.4 (build 1.4.2_13-b06), Java SE 5 Update 22 (build 1.5.0_22-b03), Java SE 6 Update 35 (build 1.6.0_35-b10), Java SE 7 Update 7 (build 1.7.0_07-b10) and Java SE 8 (build 1.8.0-ea-b57).

Is Java SE Critical Patch Update from Oct 16, 2012 closing all of the vulnerabilities you reported to Oracle?

No. Issues 29 and 50 are not addressed by that CPU. Issue 50 can be used to achieve a complete Java VM security sandbox bypass under Java SE 6 Update 37 and Java SE 7 Update 9. Oracle has communicated to us that both issues will be addressed in Feb 2013.

Which issues are being addressed by Oracle's Java SE Critical Patch Update from Feb 01, 2013?

According to information received from Oracle, this update addresses Issues 29, 50, 52 and 53.

Is Oracle's Security Alert for CVE-2013-1493 from Mar 04, 2013 closing any of the vulnerabilities you reported to Oracle?

No. As of Mar 05, 2013 eight vulnerabilities (Issues 51, 54-60) remain unpatched. We confirmed that they can be used to achieve a complete Java VM security sandbox bypass under Java SE 7 Update 17 and below.

What about the issue in Apple Quicktime for Java?

We discovered one weakness (Issue 22) in the implementation of Java API extensions embedded by Apple Quicktime software. When combined with Issue 15 reported to Oracle on Apr 2 2012, the new Apple Quickitme weakness could be used to successfully bypass all JVM security restrictions on a target system.

The issue in Apple Quicktime for Java has its own story. It's a perfect example illustrating how tricky Java security could be (this is the 4th time we point out to Apple a problem in the implementation of a fix for same security issue).

What's the reason behind including findings in IBM Java as part of the SE-2012-01 project?

IBM SDK is an implementation of Java SE technology from IBM corporation. Security issues found in IBM Java also help us illustrate certain problems related to Java security. Thus, a decision to make them part of our SE-2012-01 project (Security Vulnerabilities in Java SE).

How long did you work on this project?

The whole research took us 3 months of work in total.

Do you plan to release more technical information about the issues uncovered?

We published the results of this research on 14 November 2012 at Devoxx Java Community Conference [5] in Antwerp, Belgium. We also released a technical report and selected Proof of Concept codes for discovered vulnerabilities. All published materials are available to download from here.

Information about security defects in Java needs to be more open to the public. This will allow for the improvement of Java security in a long term. People will be more aware of the various pitfalls they should avoid and know what to look for during either code development or security review efforts.

Do you plan to include this research in your Vulnerability Research Program?

No. We decided that SE-2012-01 would be a Pro Bono security research project. This means that all vendors of affected technologies are given information about vulnerabilities in their products completely for free. We also provided all vendors with source code of our Proof of Concept codes illustrating the issues found.

Per our disclosure policy, only original vendors of the affected technology or software are provided with brief vulnerability information.

References:

PoC Codes

Last update: Oct-29-2013

Impact characteristics of the Proof of Concept (PoC) codes developed during the research of Java SE security:

PoC for Issue 1

  • complete Java security sandbox bypass

PoC for Issue 2

  • complete Java security sandbox bypass

PoC for Issue 3

  • complete Java security sandbox bypass

PoC for Issue 4

  • complete Java security sandbox bypass

PoC for Issue 5

  • complete Java security sandbox bypass

PoC for Issue 6

  • complete Java security sandbox bypass

PoC for Issue 7

  • complete Java security sandbox bypass

PoC for Issues 8 and 16

  • complete Java security sandbox bypass

PoC for Issues 9 and 17

  • complete Java security sandbox bypass

PoC for Issues 10 and 18

  • complete Java security sandbox bypass

PoC for Issues 11 and 19

  • complete Java security sandbox bypass

PoC for Issues 12 and 13

  • complete Java security sandbox bypass

PoC for Issue 14

  • JVM properties access

PoC for Issue 15

  • class instantiation in a privileged code block

PoC for Issues 20 and 21

  • complete Java security sandbox bypass

PoC for Issues 15 and 22

  • complete Java security sandbox bypass

PoC for Issues 8 and 23

  • JVM properties access, file read access

PoC for Issues 24 and 25

  • JVM properties access, file read access

PoC for Issue 26

  • complete Java security sandbox bypass

PoC for Issues 27, 28 and 29

  • complete Java security sandbox bypass

PoC for Issue 30

  • JVM properties access

PoC for Issue 31

  • class instantiation in a privileged code block

PoC for Issues 1 and 32

  • complete Java security sandbox bypass

PoC for Issue 32

  • complete Java security sandbox bypass

PoC for Issue 33

  • complete Java security sandbox bypass

PoC for Issue 34

  • complete Java security sandbox bypass

PoC for Issue 35

  • complete Java security sandbox bypass

PoC for Issue 36

  • complete Java security sandbox bypass

PoC for Issue 37

  • complete Java security sandbox bypass

PoC for Issues 38 and 39

  • complete Java security sandbox bypass

PoC for Issues 40, 41 and 42

  • complete Java security sandbox bypass

PoC for Issues 43, 44 and 45

  • complete Java security sandbox bypass

PoC for Issues 46, 47 and 48

  • complete Java security sandbox bypass

PoC for Issue 49

  • complete Java security sandbox bypass

PoC for Issue 50

  • complete Java security sandbox bypass

PoC for Issues 51 and 52

  • complete Java security sandbox bypass

PoC for Issues 51, 52 and 53

  • complete Java security sandbox and Java Control Panel security levels bypass

PoC for Issues 54 and 55

  • complete Java security sandbox bypass

PoC for Issues 56, 57, 58, 59 and 60

  • complete Java security sandbox bypass

PoC for Issue 61

  • complete Java security sandbox bypass

PoC for Issues 54 and 62

  • complete Java security sandbox bypass

PoC for Issues 63 and 64

  • complete Java security sandbox bypass

PoC for Issues 65 and 66

  • complete Java security sandbox bypass

PoC for Issue 67

  • complete Java security sandbox bypass

PoC for Issue 68

  • complete Java security sandbox bypass

PoC for Issue 69

  • complete Java security sandbox bypass

PoC for Issue 70

  • complete Java security sandbox bypass

PoC for Issue 71

  • complete Java security sandbox bypass

Details

This page presents details of security vulnerabilities and attack techniques discovered as a result of our Java SE security research project. These details are provided in a form of a technical report and presentation slides for the talk that was given by Adam Gowdiak on 14 Nov 2012 at Devoxx Java Community Conference in Antwerp.

Materials

  • "Security Vulnerabilities in Java SE", technical report, PDF file, 1.7MB (download)
  • "Security Vulnerabilities in Java SE", Devoxx presentation, PDF file, 2.3MB (download)

Oracle Vulnerability Reports

  • SE-2012-01-ORACLE, Issues #1-19, PDF file, 260KB (download)
  • SE-2012-01-ORACLE-2, Issues #20-21, PDF file, 226KB (download)
  • SE-2012-01-ORACLE-3, Issues #23-26, PDF file, 238KB (download)
  • SE-2012-01-ORACLE-4, Issues #27-31, PDF file, 214KB (download)
  • SE-2012-01-ORACLE-5, Issue #32, PDF file, 196KB (download)
  • SE-2012-01-ORACLE-6, Issue #50, PDF file, 198KB (download)
  • SE-2012-01-ORACLE-7, Issue #50 (Vulnerability Fix Experiment), PDF file, 237KB (download)
  • SE-2012-01-ORACLE-8, Issues #51-52, PDF file, 204KB (download)
  • SE-2012-01-ORACLE-9, Issue #53, PDF file, 215KB (download)
  • SE-2012-01-ORACLE-10, Issue #54-55, PDF file, 262KB (download)
  • SE-2012-01-ORACLE-11, Issue #56-60, PDF file, 239KB (download)
  • SE-2012-01-ORACLE-12, Issue #61, PDF file, 214KB (download)
  • SE-2012-01-ORACLE-13, Issue #69, PDF file, 286KB (download)
  • SE-2012-01-ORACLE-14, Issue #69#2 (broken fix), PDF file, 528KB (download)

Apple Vulnerability Reports

  • SE-2012-01-APPLE-2, Issue #24, PDF file, 213KB (download)

IBM Vulnerability Reports

  • SE-2012-01-IBM, Issues #33-49, PDF file, 253KB (download)
  • SE-2012-01-IBM-2, Issue #62-68, PDF file, 256KB (download)
  • SE-2012-01-IBM-3, Issue #70-71, PDF file, 217KB (download)
  • SE-2012-01-IBM-4, Issue #67#2 (broken fix), PDF file, 474KB (download)
  • SE-2012-01-IBM-5, Issue #70#2 (broken fix), PDF file, 419KB (download)

Oracle CVE IDs mapping

  • SE-2012-01-CVE_Map, PDF file, 259KB (download)

Issues evaluated by a vendor as no security vulnerabilities

  • Apple's "security hardening" issue, PDF file, 266KB (download)
  • Oracle's "allowed behavior" issue, PDF file, 300KB (download)

Issues never reported (bug collisions / found and fixed by the vendor / functionality removed)

  • SE-2012-01-ORACLE, Issues XX and YY, PDF file, 230KB (download)
  • SE-2012-01-ORACLE, Issues XX and YY, Proof of Concept Code, ZIP file, 8KB (download)
  • SE-XXXX-01-OPERA, PrivilegedInvoke from 2009, Proof of Concept Code, ZIP file, 6KB (download)
  • SE-XXXX-01-SUN, Various issues from 2009, Proof of Concept Codes, ZIP file, 80KB (download)

Issues found prior to 2008 and referenced in Security Explorations materials

  • Netscape 4.7+ broken JVM security model (2002), Proof of Concept Code, ZIP file, 3KB (download)
  • Solaris WBEM server and Java RMI issues (2005), Proof of Concept Codes and report, ZIP file, 24KB (download)
  • Apple Quicktime for Java, Issues #1-16 (2007), report, ZIP file, 5KB (download)

Additionally, the slides for a keynote talk given at JavaLand conference in 2016 are also provided. This talk referred to SE-2012-01 and our other research projects while discussing key problems related to Java platform security, its ecosystem and vendors.

  • "Java (in)security", PDF file, 1.4MB (download)

DISCLAIMER

Proof of Concept Codes below are provided purely for educational purposes only. It is expressly forbidden to use them for any purposes that would violate any domestic or international laws. If you do not agree with this policy, please leave this page.

  • "Security Vulnerabilities in Java SE", Proof of Concept codes, ZIP file, 309KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for Issues 27-29, ZIP file, 23KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for server side RMI attack, ZIP file, 23KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept codes for Issues 50-60, ZIP file, 147KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for Issue 61, ZIP file, 13KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept codes for Issues 62-68, ZIP file, 76KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for Issue 69, ZIP file, 16KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept codes for Issues 70-71, ZIP file, 31KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for Issue 69#2 (broken fix), ZIP file, 25KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for Issue 67#2 (broken fix), ZIP file, 8KB (download)
  • "Security Vulnerabilities in Java SE", Proof of Concept code for Issue 70#2 (broken fix), ZIP file, 12KB (download)

Vendors

This page presents current status of the communication process with vendors of affected technologies.

Summary of the communication process:

  • 02-Apr-2012
- Vulnerability Notice along with Proof of Concept codes are sent to Oracle corporation (Issues 1-19)
  • 03-Apr-2012
- Oracle confirms successfull reception and decryption of a vulnerability report. The company informs that it is investigating the issues.
  • 04-Apr-2012
- Vulnerability Notice along with Proof of Concept codes are sent to Oracle corporation (Issues 20 and 21).
- Oracle confirms successfull reception and decryption of the second vulnerability report.
  • 12-Apr-2012
- Vulnerability Notice and a Proof of Concept code are sent to Apple (Issue 22).
  • 13-Apr-2012
- Request for confirmation of a successful report decryption is sent to Apple.
- Apple confirms successful reception and decryption of the vulnerability report. The company requests additional details regarding reported Issue 22 and impact of Issue 15.
- Security Explorations provides Apple with additional details regarding Issue 22 along with a limited information pertaining to the impact of Oracle's Issue 15.
  • 16-Apr-2012
- Apple informs that Issue 22 is being investigated.
  • 17-Apr-2012
- Vulnerability Notice along with Proof of Concept codes are sent to Oracle corporation (Issues 23-26).
  • 19-Apr-2012
- Request for confirmation of a successful reception and decryption of a 3rd vulnerability report is sent to Oracle.
- Oracle confirms successfull reception and decryption of the third vulnerability report. The company informs that it does not ship JDK on MacOS and recommends contacting Apple for issues related to MacOS.
- Security Explorations asks Oracle whether the issues found in a code implemented by Sun Microsystems and affecting MacOS should be handled and fixed by Apple on its own.
  • 23-Apr-2012
- Oracle provides 11 tracking numbers for some of the reported issues. The company informs that its engineering team is assessing some other issues (including the MacOS ones) and that it will provide a monthly update until the issues are addressed.
  • 25-Apr-2012
- Oracle provides a status report for 12 reported issues. The company informs that they are under investigation / being fixed in main codeline.
  • 27-Apr-2012
- Vulnerability Notice along with Proof of Concept codes are sent to Oracle corporation (Issues 27-31).
- Oracle confirms successfull reception and decryption of the fourth vulnerability report.
  • 24-May-2012
- Oracle provides a monthly status report for the reported issues. The company informs that two issues are fixed in main codeline and are scheduled for a future CPU. The remaining issues are under investigation / being fixed in main codeline.
  • 04-Jun-2012
- Request for status update / results of the analysis is sent to Apple.
  • 08-Jun-2012
- Oracle provides a notification that 2 of the reported issues will be fixed by the Critical Patch Update to be released by the company on Jun 12, 2012.
  • 11-Jun-2012
- Oracle informs that issue 24 specific to MacOS is not in the APIs from Java SE distributed by Oracle, that it is from a project no longer supported and there will be no updates to it. The company provides a detailed mapping between 29 issues reported by Security Explorations and the corresponding 16 Oracle tracking numbers.
  • 15-Jun-2012
- Apple informs that additional security check to disable QuickTime for Java was added in Java for OS X 2012-004 update and in Java for Mac OS X 10.6 Update 9. The company provideds a link to KB publication describing these updates (http://support.apple.com/kb/HT5319).
  • 18-Jun-2012
- Security Explorations aks Apple why there is no information about the fix for QuickTime for Java issue in HT5319 publication describing latest Java security updates for MacOS. Security Explorations also asks whether same "silent fix / no credit" approach will be followed by the company with respect to the release of a security update for Apple Quicktime software for Windows.
- Issue 24 specific to MacOS is reassigned to Apple - Vulnerability Notice and a Proof of Concept code are sent to the company.
- Apple informs that issue 22 was a hardening issue as it depended on another issue already fixed and credited by Oracle. The company also informs that it does not typically credit security researchers when new security hardening enhancements are implemented as in the case of issue 22.
- Apple confirms successful reception and decryption of the vulnerability report.
  • 19-Jun-2012
- Security Explorations provides Apple with its arguments in response to the company's controversial evaluation of Issue 22. Security Explorations asks Apple whether the company considers reported issue 22 as a security vulnerability in Apple's code.
  • 21-Jun-2012
- Oracle provides a monthly status report for the reported issues. The company informs that four issues were fixed by Java CPU from Jun 2012. The remaining issues are under investigation / being fixed in main codeline.
- Security Explorations notifies Oracle of inaccurate information received regarding the number of recently fixed issues. The company is also notified about unassigned tracking number for Issue 25 and a reassignment of Issue 24 to Apple.
  • 22-Jun-2012
- Apple confirms its stance - the company informs that it consider issues that are not sufficient by themselves to lead to a security compromise to be security hardening enhancements.
  • 26-Jun-2012
- Oracle provides a tracking number for Issue 25 and a clarification regarding recently fixed issues.
  • 24-Jul-2012
- Oracle provides a monthly status report for the reported issues. The company informs that remaining unfixed issues are under investigation / being fixed in main codeline.
  • 27-Jul-2012
- Security Explorations asks Oracle whether the remaining 25 issues will be addressed by the company in October 2012 Java SE CPU.
- Oracle informs that it is working to address the remaining issues and that a number of them is targeted for the October 2012 Java SE CPU with the remaining to be addressed in February 2013.
  • 23-Aug-2012
- Oracle provides a monthly status report for the reported issues. The company informs that 19 issues are fixed in main codeline and are scheduled for a future CPU. The remaining 6 issues are under investigation / being fixed in main codeline.
  • 31-Aug-2012
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issue 32).
- Oracle confirms successful reception and decryption of the vulnerability report. The company provides a tracking number for the unconfirmed issue. Oracle informs that it will investigate the issue based on the data provided and will get back with the results soon.
  • 10-Sep-2012
- Initial requests for security contacts are sent to IBM.
- Oracle confirms Issue 32. The company informs that it will be addressed in a future Java SE Critical Patch Update.
  • 11-Sep-2012
- Vulnerability Notice along with Proof of Concept codes are sent to IBM corporation (Issues 33-49).
- IBM confirms successful reception and decryption of the vulnerability report. The company informs that the issues were sent to the appropriate product team for investigation.
  • 17-Sep-2012
- Additional Proof of Concept code for Issue 32 is sent to Oracle.
  • 19-Sep-2012
- Oracle confirms successful reception and decryption of the additional Proof of Concept code.
  • 20-Sep-2012
- IBM provides status information for the reported issues. The company informs that relevant development teams are working to address the weaknesses. IBM also provides an initial outlook regarding readiness and release dates of fixed SDK software (Nov 2012).
  • 24-Sep-2012
- Oracle provides a monthly status report for the reported issues. The company informs that 18 issues are fixed in main codeline and are scheduled for a future CPU. The remaining 2 issues are under investigation / being fixed in main codeline.
  • 25-Sep-2012
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issue 50).
- Oracle confirms Issue 50. The company provides its tracking number and informs that the issue will be addressed in a future Java SE Critical Patch Update.
  • 26-Sep-2012
- Oracle provides a comprehensive status report regarding upcoming Java CPU. The company informs that fixes for all, except two issues (29 and 50) have been integrated and are undergoing testing for a release in the October 2012 Java SE CPU. The company is evaluating fixes for Issue 50 and will provide further update on whether a fix for it will be also included in the October 2012 Java SE CPU.
  • 27-Sep-2012
- IBM informs that its engineers were able to recreate each of the vulnerabilities (Issues 33-49) and that the company has solutions for the majority working their way through development and test processes.
  • 10-Oct-2012
- Oracle informs that the company is targeting to address Issue 50 in the February 2013 Java SE Critical Patch Update.
  • 12-Oct-2012
- Oracle provides a status report for the reported issues. The company informs that 19 issues will be fixed in the upcoming Java SE Critical Patch Update to be released on October 16, 2012.
  • 15-Oct-2012
- Security Explorations asks Oracle about the reason behind company's decision to wait with a patch for a critical Java security issue (number 50) till Feb 2013.
  • 16-Oct-2012
- Oracle responds that the company was in final stages of extensive testing of October 2012 Java SE Critical Patch Update when it received Issue 50 report. Upon evaluation of Issue 50 and the options to fix it, company's assessment was that it was too late to include fixes in the October Java SE CPU. Oracle confirms that it is on track to deliver fixes for Issue 50 in the next Java SE Critical Patch Update which ships in February 2013.
- Security Explorations explains that it asked about something else, more specifically for the reason of sticking to Oracle's semi-quarter patch release schedule, which means additional four months to wait for a patch for a critical security issue in Java.
  • 18-Oct-2012
- Oracle responds that the company addresses security vulnerabilities through Critical Patch Updates and Security Alerts. The latter may be issued in the case of an urgent issue, such as one that may have been publicly disclosed. Oracle explains that their CPUs go through extensive integration testing with other products and that any delay in October Java SE CPU would result in a delay to deliver 139 fixes for applications integrating Java SE. Oracle asks whether Issue 50 will be disclosed at Devoxx conference.
- Security Explorations informs Oracle that there was no change in plans and that Issue 50 will not be disclosed at Devoxx as long as it remains unpatched by the time of a conference.
  • 19-Oct-2012
- Security Explorations challenges Oracle and provides it with the results of its Vulnerability Fix Experiment. The experiment leads to the conclusion that a fix for Issue 50 can be implemented within half an hour time, that only 25 characters need to be changed in a source code to implement the fix and that no integration tests with other applications are required for it.
- Oracle confirms successful reception and decryption of the fix experiment report. The company informs that someone will respond as soon as possible.
  • 23-Oct-2012
- Oracle provides a monthly status report for the reported issues. The company confirms vulnerabilities fixed by Oct Java SE CPU and informs that the remaining 2 issues are under investigation / being fixed in main codeline.
  • 31-Oct-2012
- IBM provides a status update for the reported issues. The company informs that it has developed and tested solutions for each of the issues and that fixed builds of IBM SDK should be ready for download in Nov.
  • 14-Nov-2012
- IBM provides a link to blog entry describing security fixes released for vulnerable software.
  • 27-Nov-2012
- Oracle provides a status report for Issues 29 and 50. The company informs that they are under investigation / being fixed in main codeline.
  • 17-Dec-2012
- Oracle provides a status report for Issues 29 and 50. The company informs that they are fixed in main codeline and scheduled for a future CPU.
  • 18-Jan-2013
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issues 51 and 52).
- Oracle confirms successful reception and decryption of the vulnerability report. The company informs that it will investigate based on the data provided and get back to us soon.
- Oracle provides tracking numbers for Issues 51 and 52.
  • 25-Jan-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issues 29, 50 and 52 are fixed in main codeline and are scheduled for a future CPU. The remaining Issue 51 is under investigation / being fixed in main codeline.
  • 27-Jan-2013
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issue 53).
  • 28-Jan-2013
- Oracle confirms successful reception and decryption of the vulnerability report. The company informs that it will investigate based on the data provided and get back to us soon.
- Oracle provides a tracking number for Issue 53.
  • 01-Feb-2013
- Oracle provides a status report regarding upcoming Java CPU. The company informs that fixes for Issues 29, 50, 52 and 53 will be incorporated into Critical Patch Update, due to be released on Feb 01, 2013.
  • 25-Feb-2013
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issues 54 and 55).
- Oracle confirms successful reception and decryption of the vulnerability report. The company informs that it will investigate based on the data provided and get back to us soon.
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 51 is under investigation / being fixed in main codeline. The report does not mention Issues 54 and 55 yet.
- Oracle provides tracking numbers for Issues 54 and 55, but claims they are still not confirmed.
  • 27-Feb-2013
- Security Explorations asks Oracle whether it needs any assistance in running the received Proof of Concept Code or whether a confirmation of reported vulnerabilities from a 3rd party such as US-CERT would be helpful for the company. Security Explorations informs Oracle that it expects a clear confirmation or denial of Issues 54 and 55 (in the past, reception of tracking numbers from Oracle was equivalent to the confirmation of a given report).
- Oracle provides the results of its assessment and informs that Issue 54 is not a vulnerability (it demonstrates the "allowed behavior"). The company confirms Issue 55.
- Security Explorations disagrees with Oracle's assessment regarding Issue 54 and provides the company with its arguments. Security Explorations demonstrates to Oracle a corresponding sample of "allowed behavior" of Issue 54 that leads to a denied access and a security exception.
  • 28-Feb-2013
- Security Explorations provides Oracle with another example illustrating denied access for a similar condition as Issue 54. The company asks Oracle whether it still considers Issue 54 as a non-vulnerability demonstrating the "allowed behavior".
- Oracle informs that the company is investigating the issue and will get back to us once the investigation is completed.
  • 04-Mar-2013
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issues 56-60).
- Oracle confirms successful reception and decryption of the vulnerability report. The company informs that it will investigate based on the data provided and get back to us soon.
- Oracle provides tracking numbers for Issues 56-60, claims they are still not confirmed.
  • 05-Mar-2013
- Oracle informs that it is continuing to evaluate Security Explorations' arguments regarding Issue 54. The company provides a background for that evaluation (references to JVM specs) and suggests a technical discussion with the representatives of its VM and Security Teams.
  • 11-Mar-2013
- Security Eplorations asks Oracle for the final evaluation of Issue 54.
- Oracle informs that it is continuing to evaluate Issue 54 and will provide with its final evaluation once it is completed.
  • 26-Mar-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issues 55, 57, 59 are fixed in main codeline and are scheduled for a future CPU. The remaining Issues 51, 54, 56, 58 and 60 are under investigation / being fixed in main codeline.
  • 05-Apr-2013
- Oracle confirms Issues 57-60. The company informs that they will be addressed in a future Java SE Critical Patch Update.
  • 09-Apr-2013
- Security Explorations asks Oracle whether confirmation of only 4 out of 5 issues reported on 04-Mar-2013 means that Issue 56 is not considered as a security vulnerability by the company ("allowed behavior", etc.).
  • 10-Apr-2013
- Oracle informs that it is still in the process of evaluating Issue 56 and will provide with its final evaluation once it is completed.
  • 12-Apr-2013
- Oracle provides a status report regarding upcoming Java CPU. The company informs that fixes for Issues 51, 55, 57, 58, 59 and 60 will be incorporated into Critical Patch Update, due to be released on Apr 16, 2013.
  • 16-Apr-2013
- Oracle provides its evaluation of Issue 56. The company's analysis backs the claim that Issue 56 demonstrates the behavior not forbidden by the JVM specification.
  • 22-Apr-2013
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issue 61).
- Oracle confirms successful reception and decryption of the vulnerability report. The company informs that it will investigate based on the data provided and get back to us soon.
- Oracle provides a tracking number for Issue 61.
  • 23-Apr-2013
- Oracle provides a monthly status report for the reported issues. The company informs that five issues were fixed by Java CPU from Apr 2013. The remaining issues (54, 56 and 61) are under investigation / being fixed in main codeline.
  • 24-Apr-2013
- Oracle confirms Issue 61. The company informs that it will be addressed in a future Java SE Critical Patch Update.
  • 26-Apr-2013
- Oracle informs that it plans to close Issue 56 by May 10, 2013.
  • 06-May-2013
- Vulnerability Notice along with Proof of Concept codes are sent to IBM corporation (Issues 62-68).
- IBM confirms successful reception of the vulnerability report. The company informs that it will be looking into it. IBM also informs that "by submitting the material to the company, Security Explorations have granted to IBM Corporation, its subsidiaries and its affiliates, a perpetual, irrevocable, no charge license to all intellectual property rights related to the use of this material."
  • 07-May-2013
- Security Explorations informs IBM that the material was provided to IBM free of any charge, but it cannot be shared with any 3rd party beyond IBM. Security Explorations asks IBM whether it lacks properly skilled engineers among 400+ thousands employees to successfully resolve the reported issues.
- IBM informs that its people are working through the reported issues. The company will provide update accordingly to the progress.
  • 21-May-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 61 is fixed in main codeline and is scheduled for a future CPU. The remaining Issue 54 is under investigation / being fixed in main codeline. Issue 56 was closed by the company ("not a bug").
  • 24-May-2013
- IBM provides a status report for the reported issues. The company confirms Issues 62-68 and incomplete patches for Issues 35, 36, 37 and 49. The company informs that fixes for each of the issues have been developed and are currently undergoing quality assurance.
  • 12-Jun-2013
- A request for CVE numbers corresponding to vulnerabilities reported by Security Explorations as part of SE-2012-01 project is sent to Oracle.
  • 17-Jun-2013
- Oracle provides an evaluation of Issue 54 by its engineering team. The company informs that the issue will be closed as not a vulnerability.
  • 19-Jun-2013
- Oracle provides CVE numbers corresponding to vulnerabilities reported by Security Explorations as part of SE-2012-01 project.
  • 24-Jun-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 54 was closed (not treated as a security bug) and that Issue 61 was fixed in Java SE CPU from Jun 2013.
  • 03-Jul-2013
- IBM provides a status report for the reported issues. The company informs that the latest release of IBM Java for Linux addresses Issues 62-68 and incomplete patches for Issues 35, 36, 37 and 49.
  • 18-Jul-2013
- Vulnerability Notice along with a Proof of Concept code are sent to Oracle corporation (Issue 69).
- Oracle confirms successful reception and decryption of the vulnerability report. The company provides a tracking number for Issue 69 and informs that it will investigate based on the data provided and get back to us soon.
  • 24-Jul-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 69 is fixed in main codeline and is scheduled for a future CPU.
  • 26-Jul-2013
- Oracle confirms Issue 69. The company informs that it will be addressed by a backported (from JDK 8) implementation of the affected component in JDK 7 Update 40 that is to be released in September 2013.
  • 29-Jul-2013
- Security Explorations inquiries IBM for links / references to security bulletins released by the company in a response to the fixing of Issues 62-68 and incomplete patches for Issues 35, 36, 37 and 49.
  • 31-Jul-2013
- IBM provides a link to the security bulletin describing fixes released for vulnerable Java software.
  • 23-Aug-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 69 is fixed in main codeline and is scheduled for a future CPU.
  • 24-Sep-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 69 is fixed in main codeline and is scheduled for a future CPU.
  • 11-Oct-2013
- Oracle provides a status report regarding upcoming Java CPU. The company informs that a fix for Issue 69 will be incorporated into Critical Patch Update, due to be released on Oct 15, 2013.
  • 16-Oct-2013
- Vulnerability Notice along with Proof of Concept codes are sent to IBM corporation (Issues 70-71).
- IBM confirms successful reception and decryption of the vulnerability report. The company informs that it will be looking into the report and provides PSIRT Advisory number for it.
  • 18-Oct-2013
- IBM informs that as a result of its testing of received Proof of Concept codes against soon to be released 4Q service update, the company have found that Issues 49, 70 and 71 have all been addressed.
- Security Explorations asks IBM for confirmation of whether the most recent version of IBM SDK available to general public (Version 7 SR5) is affected to the reported issues.
  • 21-Oct-2013
- IBM confirms that Issues 49, 70 and 71 are reproducible in the latest current release of IBM SDK (Version 7 SR5).
  • 24-Oct-2013
- Oracle provides a monthly status report for the reported issues. The company informs that Issue 69 was fixed in Java SE CPU from Oct 2013.
  • 07-Nov-2013
- IBM informs about a new release of its Java software (IBM SDK Version 7 SR6). The company provides a link to the security bulletin describing corresponding security fixes.
  • 30-Oct-2015
- Security Explorations asks IBM for CVE numbers corresponding to vulnerabilities reported as part of SE-2012-01 project (Issues 33-49, 62-68, 70-71 and improperly fixed Issues 35, 36, 37 and 49).
- Security Explorations asks Oracle for a CVE number corresponding to Issue 69.
- IBM provides CVE numbers for Issues 33-49, 62-68 and improperly fixed Issues 35, 36, 37 and 49.
- Oracle informs that it will gather the requested information and get back to us.
  • 31-Oct-2015
- Security Explorations informs IBM that it is still missing CVE IDs for Issues 70-71. The company asks IBM to provide the missing numbers.
  • 02-Nov-2015
- IBM provides CVE numbers for Issues 70 and 71.
- Oracle provides a CVE number for Issue 69.
  • 24-Mar-2016
- Oracle provides a status report regarding a broken security fix for Issue 69. The company informs that it was fixed by Security Alert for CVE-2016-0636 issued on Mar 23, 2016.