Attackers Pounce on Zero-Day Java Exploit

Discussion in 'malware problems & news' started by siljaline, Aug 27, 2012.

Thread Status:
Not open for further replies.
  1. Coldmoon

    Coldmoon Returnil Moderator

    Joined:
    Sep 18, 2006
    Posts:
    2,981
    Location:
    USA
  2. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    Wow then Chromium rules, because it was configured by default to ask. :D
     
  3. safeguy

    safeguy Registered Member

    Joined:
    Jun 14, 2010
    Posts:
    1,795
    Same here. There are good suggestions listed on this thread for users who need Java. However, I still honestly feel that uninstalling Java from one's system is the best suggestion if one can afford it. Many a times I see Java (and outdated ones) on machines in which the users hardly have a need for it. Granted sometimes one may have a need for it but let's say if the need is a rare instance, it is in my opinion that the inconvenience of downloading/installing the latest version of Java for a 1-time use is worth it.
     
  4. tlu

    tlu Guest

    Because you enabled click-to-play? You can do that also in Firefox and Opera.
     
  5. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Chromium/Chrome always asks before running Java on a new website.
     
  6. tlu

    tlu Guest

    Thanks - I didn't know that (I had java disabled anyhow).
     
  7. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Researchers find critical vulnerability in Java 7 patch hours after release

    https://www.computerworld.com/s/art...erability_in_Java_7_patch_hours_after_release

    Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code on the underlying system.


    To be more clear the exploit does not make use of the patch ie: the patch did not introduce the vulnerability. The patch removed some areas that should have been protected initially. This was enough to stop the current vulnerabilities but not quite good enough to stop there others.
     
  8. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    Back to disable.
     
  9. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    Okay, I finally figured out how to protect against this exploit...
    Adios, Java!
    Took me a little longer than some other folks around here, but I eventually got it. :thumb:
     
  10. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Java Java, non stop Palava :thumbd: :p

    @ Coldmoon

    Hello Sir, how ya doing :)

    Does Returnil AV protect against this ?
     
  11. mattbiernat

    mattbiernat Registered Member

    Joined:
    Aug 17, 2012
    Posts:
    179
    Location:
    U.S.
    How to secure Java?

    To Moderators: Okay, I started a new topic because I would like to get specific answers on how to secure Java.

    To everyone else: One of my critical applications relies on Java. How do I run it securely despite all those zero day attacks...
     
  12. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
    Oracle's Java Security Woes Mount As Researchers Spot A Bug In Its Critical Bug Fix
     
  13. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    Words to the wise...
     
  14. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    I didnt enable anything it was by default, luckily i always use "Just Once" so it never remembers any website. :D
     
  15. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    To one degree or another, this has always been the case. ATM, it's Oracle and java. At varying times it's been Abode, both their PDF reader and flash. Microsoft has been there for multiple items, including the always popular Internet Explorer. They've had to patch their patches on more than a few occasions. They've all had and still have unpatched vulnerabilities, and these are only the ones we know about. Patching does not and never will make you secure. It's little more than closing individual holes in a screen door.

    It's always been up to the user to recognize that attack surface apps are vulnerable and will always be vulnerable. The users security policy should acknowledge this by:
    1. Removing or disabling the unnecessary attack surface components.
    2. Reducing access to the more vulnerable parts of the attack surface, eg blocked by default, allowed by exception.
    3. Hardening the attack surface apps, isolating them from the rest of the system, reducing privilege, etc.
     
  16. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    But since this thread is about Java, we specify Oracle. ;)
    It's up to us, not them, to protect our machines.
    Hopefully that becomes clearer all the time.
    PS - Enjoyed the "closing individual holes in a screen door" line.
     
  17. guest

    guest Guest

    "Removing or disabling the unnecessary attack surface components."

    This is how I look at the entire operation system on my PC

    Entire Install Size of Windows XP at around 200Mb does not
    leave too much left to hack:argh:
     
  18. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    I learned this almost eight years ago, when I was introduced to the concept of White Listing from a Security Paper by SecureWave, an EndPoint Solutions security company which is now Lumension Security.

    From their Paper:

    An Ounce of Prevention
    http://www.infosec.co.uk/ExhibitorLibrary/123/An_Ounce_of_Prevention.pdf
    There are many knowledgeable/alert System Administrators out there that we don't hear about, because their systems are not compromised, so no sensational stories to make the latest news.

    Just one example: Shortly following the emergence of the LNK exploit - MS10-046 (via boobytrapped USB sticks) - I spoke with one System Administrator whose organization has about 300 workstations.

    He told me that a Group Policy prevented any code from running from USB external media on the workstations.

    ----
    rich
     
    Last edited: Sep 1, 2012
  19. Amin

    Amin Registered Member

    Joined:
    May 16, 2012
    Posts:
    437
    Location:
    UK
    Java v7 update 7 is free from exploits now ?

    or it has critical vulnerabilities as well ?

    what should i do to protect myself from that vulnerability ?
     
  20. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    There is a new issue with this update that when combined with issues from April 2012, can facilitate a successful code execution attack on Java 7.
    Disable Java or remove it has been the recommendation all along.
    I disabled, then decided to uninstall.
    My computers so far run fine without it.
     
  21. constantine76

    constantine76 Registered Member

    Joined:
    Dec 18, 2010
    Posts:
    191
    Lifted from Oracle's Java Security Woes Mount As Researchers Spot A Bug In Its Critical Bug Fix

    Java 7 Update 7 still vulnerable! Tsk....Goodbye Java!

    How to Unplug Java from the Browser
     
  22. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Eight years ago is when I started learning the value of a default-deny policy and of isolating/un-integrating the attack surface apps. I definitely don't miss the "constant state of emergency" that some make every new exploit out to be.
    The security industry doesn't profit from strong, well implemented policy either. If anything, it hurts product sales. IMO, the hype over new exploits and vulnerabilities is primarily to create fear and a demand for their security products, much of which is powerless against new exploits anyway.
     
  23. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
    I use Appguard in lockdown mode from BlueRidge Networks so I run Java, and Adobe all I want. I don't really see any of these exploits or any future exploits getting by Appguard anytime soon. I could be wrong, but that is how confident I am in Appguard.
     
  24. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  25. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    98,010
    Location:
    U.S.A.
    Merged Threads to Continue Related Topic.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.