Attackers have released exploit code targeting two previously patched flaws in Sun Microsystems' Java Runtime Environment (JRE) and Java Software Development Kit (SDK).
The flaws could allow an attacker to remotely execute code on a Windows, Linux or Solaris system. Sun issued patches for both vulnerabilities in December.
The vulnerabilities affect JRE 1.3.x, 1.4.x and 1.5.x, as well as versions 1.3.x and 1.4.x of the SDK and versions 1.5.x of the Java Development Kit.
Danish security vendor Secunia rates one of the vulnerabilities as 'highly critical', the company's second-highest level, owing to the possibility for remote code execution.
"Sun has been very thorough and steady in the stuff it implements and how fast it implements it," he said.
Sites pointed out that Java is inherently a more secure system, because JRE uses so-called sandboxing that allows it to operate as a virtual machine to block access to other parts of the system.
As soon as the programs reach outside the virtual machine for system files, the security protection of the sandbox is negated.
Sites said that this latest exploit is particularly worrying, as the code could be embedded in a small Java application that launches from a browser window and could deliver a malicious payload very quickly.
Australian government to require technology and communications companies to provide access to messages
New bill avoids demanding 'backdoors' in encryption, but includes measures to compel companies to provide access to encrypted communications
Indonesian overclocker Ivan Cupa (with the aid of a lot of liquid nitrogen) achieves record overclock on AMD's latest Threadripper
Ssupermassive black hole is so big it corresponds to four per cent of the galaxy's total mass
Imminent attack will target a single bank with cloned cards used to fraudulently withdraw millions over one weekend