Java Glitch Found

SANTA CLARA, Calif. – Security firm iDefense issued a warning Tuesday that Sun Microsystems' Java Plug-in technology has been identified as having a vulnerability that if exploited could expose a user's network.

The Java Plug-in establishes a connection between popular browsers and the Java platform.

According to Reston, Va.-based iDefense, which roots out malicious code, the vulnerability has been detected in Java 2 Platform, Standard Edition (J2SE) 1.4.2_01 and 1.4.2_04.

The security firm also believes that earlier versions of Java Virtual Machine are vulnerable and that browsers such as Internet Explorer, Mozilla and Firefox on both Windows and Unix platforms could be exploited if they are running a vulnerable JVM.

The vulnerability could provide a gateway for a hacker to bypass the Java sandbox and all security restrictions imposed within Java Applets and provide access to downloading, uploading or executing files within the user's PC, iDefense warned.

"Successful exploitation allows remote attackers to execute hostile Applets that can access files as well as access the network," iDefense stated.

According to the developer's definition, a JVM "mimics" a real Java processor, enabling Java bytecode to be executed as actions or operating system calls on any processor regardless of the operating system.

"A number of private Java packages exist within the JVM and are used internally by the VM," iDefense stated. "Security restrictions prevent applets from accessing these packages. Any attempt to access these packages, results in a thrown exception of 'AccessControlException,' unless the applet is signed and the user has chosen to trust the issuer."

The security firm is recommending that disabling Java or JavaScript will prevent exploitation as the vulnerability relies on the data transfer between the two components.

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

Teasy Agency Launches Marketing Firm

Teasy Agency has officially launched Teasy Marketing firm.

Ofcom Investigates More Sites in Wake of AV Traffic Shifts

U.K. media regulator Ofcom has launched investigations into 20 more adult sites as part of its age assurance enforcement program under the Online Safety Act.

MintStars Launches Debit Card for Creators

MintStars has launched its MintStars Creator Card, powered by Payy.

xHamster Settles Texas AV Lawsuit, Pays $120,000

Hammy Media, parent company of xHamster, has settled a lawsuit brought by the state of Texas over alleged noncompliance with the state’s age verification law, agreeing to pay a $120,000 penalty.

RevealMe Joins Pineapple Support as Partner-Level Sponsor

RevealMe has joined the ranks of over 70 adult businesses and organizations committing funds and resources to Pineapple Support.

OnlyFans Institutes Criminal Background Checks for US Creators

OnlyFans will screen creators in the United States for criminal convictions, CEO Keily Blair has announced in a post on LinkedIn.

Pineapple Support to Host 'Healthier Relationships' Support Group

Pineapple Support is hosting a free online support group on enhancing connection and personal growth.

Strike 3 Rejects Meta 'Personal Use' Defense in AI Suit

Vixen Media Group owner Strike 3 Holdings this week responded to Facebook parent company Meta’s motion to dismiss Strike 3’s suit accusing Meta of pirating VMG content to train its artificial intelligence models.

Pornhub, Stripchat: VLOP Designation Based on Flawed Data

In separate cases, attorneys for Pornhub and Stripchat this week told the EU’s General Court that the European Commission relied on unreliable data when it classified the sites as “very large online platforms” (VLOPs) under the EU’s Digital Services Act, news organization MLex reports.

New Age Verification Service 'AgeWallet' Launches

Tech company Brady Mills Agency has officially launched its subscription-based age verification solution, AgeWallet.

Show More