Recently, the library openssl has been revealed to have a serious flaw that enables attackers to read up to 64KB of memory.
http://blog.existentialize.com/diagnosis-of-the-openssl-heartbleed-bug.html
The cause seems to be due to the use of memcpy and not cross checking the size of the input provided by the attacker.
If we assume standard libraries (not calling out to C), is Java immune to these types of security flaws?
To be more specific about type of security flaw, I'm not referring to trusting user input, but specifically bounded memory access.