Wednesday, August 29, 2012

Java 7 (1.7) JRE vulnerability

Are you vulnerable to the latest Java 0-day exploit?

Test to see if you're vulnerable.

The DeepEnd Research have been in contact with Michael Schierl  the Java expert who discovered a number of Java vulnerabilities, including recent the Java Rhino CVE-2011-3544 / ZDI-11-305 and  CVE-2012-1723. We asked him to have a look at this last exploit . Michael sent his detailed analysis, which we will publish in the nearest future and a patch , which we offer on a per request basis today.

The Fix

There is no fix yet. The solution is disable Java plugin in all your browser to prevent malicious applets from running. The latest iteration of Java is version 1.7 revision 6. This is now the default version on Windows. Mac OS X still uses Java 1.6 (latest version: 1.6.33). Java 1.6.33 is NOT vulnerable to the latest 0-day exploit. However, I would not suggest that anybody downgrade from Java 1.7 to Java 1.6 as it is not yet known if version 1.6 is vulnerable to other flaws fixed in 1.7.




 Firefox

Go to Tools - Add-ons - Plugins

Look for Java Deployment Toolkit and/or Java Platform SE. Disable them all.


Java disabled in Firefox

Chrome

Go to WrenchSettings and Show advanced settings... - Privacy and Content settings - Plug-ins - Disable individual plug-ins... - Java - disable. It is quite difficult to find!

Java enabled in Chrome

Internet Explorer

Go to Tools - Manage Add-ons. Disable Java(tm) Plug-in SSV Helper and Java(tm) Plug-in 2 SSV Helper.


Java disabled in Internet Explorer 9
Sources : 
  • http://research.zscaler.com/2012/08/are-you-vulnerable-to-latest-java-0-day.html
  • http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html

No comments:

Post a Comment