Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Unofficial Patch Released for Java Flaws Found by Google Researcher

Unofficial patches have been released for two unfixed Oracle Java Runtime Environment (RE) vulnerabilities discovered by Google Project Zero researcher Mateusz Jurczyk.

Unofficial patches have been released for two unfixed Oracle Java Runtime Environment (RE) vulnerabilities discovered by Google Project Zero researcher Mateusz Jurczyk.

On February 18, Google Project Zero made public the details of four Java RE vulnerabilities caused by heap-based out-of-bounds read bugs. The security holes were discovered during fuzz testing aimed at the processing of TrueType and OpenType fonts. Project Zero tracks them internally as 1779, 1780, 1781 and 1782.

The flaws, described by Project Zero as “medium severity,” were reported to Oracle on February 12 and their details were disclosed less than a week later after the vendor said it would only address the issues in a future release of Java as a Security-in-Depth improvement rather than actual vulnerabilities due to the fact that the “scenario described does not provide a way for an attacker to exploit the user system directly.”

Java patches released by 0patchWhen it disclosed the vulnerabilities on February 18, Project Zero marked them as “WontFix.” However, Oracle changed its mind in mid-March and decided that it will patch them in a future release of Java RE.

ACROS Security’s 0patch third-party patching service, for which a PRO version was recently launched, decided not to wait around for Oracle and created its own fixes that Java users can obtain for free and easily deploy.

0patch has released micropatches for two of the four bugs, but it told SecurityWeek that it will soon release fixes for the other two as well.

The patches prevent exploitation of the flaws by terminating the execution of java.exe when out-of-bounds access is detected. “We felt trying to sanitize malicious input was too risky and could just move the vulnerability elsewhere,” 0patch explained.

The company says the patches only apply to Java 8 update 202, the Patch Set Updates (PSU) version in which Project Zero discovered the flaws. Oracle’s Critical Patch Updates (CPU) include only fixes for critical flaws, while PSU also include non-critical fixes. Java users who typically install only CPU are currently on update 201 and 0patch says it may port its micropatches to this version as well.

Oracle’s next CPU is scheduled for April 16. It remains to be seen if it will include patches for these flaws.

Advertisement. Scroll to continue reading.

On their own, these vulnerabilities don’t pose a serious risk to Java RE users.

“Exploitability seems to be pretty low — anything outside of DOS is speculation at this time, but perhaps someone could use them for defeating ASLR. A remote attack is only possible if the attacker can supply their own font to the Java server, which will then render it,” Mitja Kolsek, CEO and co-founder of ACROS Security, told SecurityWeek.

However, Kolsek says his company has a very good reason for releasing patches for these vulnerabilities.

“The main point is to demonstrate that Java, which is a huge pain point in enterprises, can also be patched by someone other than Oracle,” he explained. “Another point is that for vulnerabilities that are publicly disclosed, the distance between ‘unlikely to be exploited’ and ‘exploited in the wild’ can turn out to be very short — if someone found another, more powerful 0day that would require breaking ASLR, they could use this ‘unlikely to be exploited’ vulnerability to make a full exploit chain.”

“Exploitation is a weird game and by closing such publicly known holes we can make an important impact (or none at all, and we may even never know),” Kolsek added.

0patch previously released micropatches for flaws affecting WindowsWinRAROpenOfficeMicrosoft’s JET Database, and Adobe Reader.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.