Main Nav

Curious to know how you all plan to react to the Java 7 Security Manager Bypass Zero-day Vulnerability.

 

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4681

 

--------------------------------------

Darrell Bateman

Assistant Vice President for IT and ISO

Office of the Chief Information Officer

Information Technology Division

Texas Tech University

 

Comments

I sent an awareness message to the administrators throughout university, encouraging them to work with their clients as appropriate.  I included an expurgated copy below if you’d like to re-apply it. 

 

Quinn R Shamblin
------------------------------------------------------------------------------------------------
Executive Director of Information Security, Boston University
CISM, CISSP, GCFA, PMP  –  O 617-358-6310  M 617-999-7523

 

 

++++++++++++++++++++++++++++++++++

Hello Everyone,

 

A new zero-day vulnerability in Java—a  Poison Ivy variant—has been discovered and exploits are being found in the wild.  The flaw affects all versions of Oracle's Java 7 (version 1.7) on all supported platforms. No patch is available at this time.  Java 6 and earlier are currently unaffected (although this is doubtlessly being worked on as we speak).

 

You can test your machine here: http://www.isjavaexploitable.com/

 

In order for this vulnerability to be exploited, you have to visit a web page or follow a link to an infected site.  If you get hit with this, the software can do anything with your computer that you can.  Rapid7, a security research company, has released the above tool to test if your machine is exploitable through Java. 

 

A copy of this message will be posted to TechWeb (www.bu.edu/tech) for reference.  Check there for further updates and information regarding this issue.

 

Recommendations:

 

·      If you are not using any programs that require Java, remove it from your system altogether.  Java is one of the most heavily exploited platforms in the world today due to its almost ubiquitous presence.

·      If you have to have Java for a specific program, but don’t need it for the web pages you visit, disable Java for universal use on your browsers. (Links for how to do this are below.)  It is safest to allow use of Java browser plug-ins on a case-by-case basis when prompted for permission by trusted programs.

·      If you can't do that, at least confine your browsing to regular commercial sites which, while not immune from being infected, are typically more carefully maintained and monitored and represent a lower risk.  This is not a reliable security approach, but it is better than nothing.

 

How to disable Java...

 

...in Safari: http://support.apple.com/kb/HT5241

...in IE: http://kb.iu.edu/data/ahqx.html

...in FireFox: http://support.mozilla.org/en-US/kb/How%20to%20turn%20off%20Java%20applets

                (For Firefox on Mac OS X, it is like Windows XP (Tools > Add-ons))

...in Chrome:  While in Chrome, enter this URL:  chrome://plugins/  then click "Disable" under Java.

 

 

To read the Story:

 

http://www.huffingtonpost.com/2012/08/27/java-update-hackers_n_1834815.html

http://nakedsecurity.sophos.com/2012/08/28/unpatched-java-exploit-spreads-like-wildfire/

 

++++++++++++++++++++++++++++++++++