Sun Microsystems has disclosed a serious vulnerability in the Java Plug-in technology within the Software Developers’ Kit (SDK) and the Java Run-time Environment (JRE) that allows attackers to bypass the Java sandbox and Java applet security.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The episode is potentially damaging for Sun. Its chief executive officer Scott McNealy has repeatedly emphasised the secure nature of Java in comparison to Microsoft's alternatives.
Beloff said McNealy’s claims for Java were "reasonable, because it was designed to be more secure, and it’s a good design".
He added that the idea of the sandbox, put forward by Sun in the mid-1990s to enable applets to run within protected environments, was "very good from the security point of view" and one which, at the time, had distinguished Java applets from rival technologies such as Microsoft’s COM components.
In disclosing the vulnerability, Sun says there is no workaround, and recommends that users of SDK and its JRE subset move to versions 1.4.2_06 and later or 1.3.1_13 and later - both of which are available from java.sun.com.
Worse still, it goes on to point out that "other Java Virtual Machines, such as the Microsoft VM, are available and can be used as an alternative".
Rik Turner writes for Techworld.com