• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Serious Java Bug Exposes Users To Code Execution

April 12, 2010

Views: 6,515

[ad]

Once again a different attack vector, seems to the creative season for discovering bugs. I guess it’s partially due to the fact this time of year tends to be pretty quiet business wise so researchers have plenty of downtime to look at nifty ways to break things.

This might be a tough one to solve as it’s not a typical buffer overflow or programming bug per-se but more of a flaw in the way the Java Virtual Machine functions. Sun don’t consider this vulnerability to be critical, which could be a mistake on their part as that means it won’t be patched until the next patch in the cycle is released – which should be around July.

A Google researcher has published details of a Java virtual machine bug that could be used to run unauthorized programs on a computer.

The attack was disclosed Friday by Google’s Tavis Ormandy, who said he had notified Oracle’s Sun team about the flaw earlier. “They informed me that they do not consider this vulnerability to be of high enough priority to break their quarterly patch cycle,” Ormandy wrote. “I did not agree.” Oracle declined to comment on the issue. The company just released a major Java update last week and its next set of patches is due in July.

The attack could give hackers a way to run unauthorized Java programs on a victim’s machine. They can do this because Java allows developers to tell the Java virtual machine to install alternate Java libraries. By creating a malicious library and then telling the JVM to install it, an attacker could run his malicious program.

The attack was actually disclosed by a Google employee, in some articles it stated he did not wish for his company name to be disclosed but it was anyway in this article at least.

It works in a fairly roundabout way by leveraging on the fact Java allows developers to run libraries using the JVM, by installing an alternate malicious library an attacker could compromise the machine.

Oracle is making a mistake, not patching the bug immediately, said Marc Maiffret, chief security architect with FireEye, via instant message.

The bug is particularly nasty because it’s due to a design flaw in Java, rather than the type of programming error that would lead to a more common buffer-overflow attack. “It is a neat bug,” he said.

However, Java-based attacks are still rare, and rather than developing a brand-new type of attack, criminals are more likely to spend their time using known vectors such as the browser or Adobe Reader, said Russ Cooper, a senior information security analyst with Verizon Business.

“Java has not been exploited to any extent that should worry the average consumer, heck, or business for that matter,” he said via instant message.

Risk wise however, I’d have to agree it’s not particularly high as historically Java attacks aren’t really common and attackers will play the numbers game attacking whatever will yield the most infections.

The flaw affects all versions since Java SE 6 update 10 for Microsoft Windows and could possibly effect Linux users – but that hasn’t been verified yet.

More via The Reg here – Critical Java Vulnerability

Source: Network World

Related Posts:

  • An Introduction To Web Application Security Systems
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • Argusee and Agentic AI in Cybersecurity
  • Intel Finally Patches Critical AMT Bug (Kinda)
  • Time Warner Hacked - AWS Config Exposes 4M Subscribers
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Exploits/Vulnerabilities, Secure Coding, Web Hacking Tagged With: fireeye, java, java exploit, java vulnerability, JAVA-security, tavis ormandy



Reader Interactions

Comments

  1. Agamemnon says

    April 12, 2010 at 7:54 pm

    I tested out this POC today throughout my environment and it defintely works I can remotely have user click a link and it runs Java which could imbed any code I wanted. It doesn’t work in updates 6 and 7 for sure but updates 10-19 I’m pretty sure are all gonna suffice for this to work. Also, there are currently no signature files in Finjan for this, blink works on full on block mode and Cisco’s CSA product will let this sucker right on through..

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,293

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,135

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,406

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,323

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,241

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,119

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,180)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,564)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,361)
  • Password List Download Best Word List – Most Common Passwords (934,679)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,406)
  • Hack Tools/Exploits (674,320)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,445)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy