Security Research
Showing results for 
Search instead for 
Do you mean 

One-Third Ain't Bad

Brian_Gorenc on ‎10-16-2013 03:24 PM

Of the Oracle vulnerabilities patched yesterday, HP's Zero Day Initiative (ZDI) researchers were responsible for 33% of Java's most critical issues (CVSS = 10.0) and an additional one resolves an issue with Oracle's Middleware technology. All of the corrected Java vulnerabilities allow attackers to bypass the sandbox and execute attacker controlled code.


Several of the Java sandbox bypasses being patched utilize unsafe reflection vulnerabilities to gain code execution. Unsafe reflection vulnerabilities are one of the most popular weaknesses being used by Java malware today. HP ZDI recommends that end-users deploy these patches as soon as possible to minimize the risks being highlighted.  Remember, end-users are not the only people analyzing the patches released yesterday.  Attackers have likely begun reverse engineering the patches and writing proof-of-concepts to trigger the corrected vulnerabilities.


For more detailed information about the vulnerabilities attributed to ZDI researchers, check out our published advisory page ( Since the beginning of 2013, we have successfully disclosed 250 security advisories in widely deployed applications and high value enterprise software products.


As always, HP's Zero Day Initiative looks forward to analyzing (and purchasing) the next set of fresh Java vulnerabilities that will come into the program over the next several weeks.  

0 Kudos
About the Author


Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference on August 29 - September 1, 2016 to learn from peers in every industry and hear from Big Data experts and thought lea...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference on September 13 - 16, 2016, and is the place to meet the world’s top information security talent, discuss new pr...
Read more
View all