Homeland Security warns to disable Java amid zero-

GURPS

INGSOC
PREMO Member
Homeland Security warns to disable Java amid zero-day flaw





The U.S. Department of Homeland Security has warned users to disable or uninstall Java software on their computers, amid continuing fears and an escalation in warnings from security experts that hundreds of millions of business and consumer users are vulnerable to a serious flaw.



Hackers have discovered a weakness in Java 7 security that could allow the installation of malicious software and malware on machines that could increase the chance of identity theft, or the unauthorized participation in a botnet that could bring down networks or be used to carry out denial-of-service attacks against Web sites.

"We are currently unaware of a practical solution to this problem," said the DHS' Computer Emergency Readiness Team (CERT) in a post on its Web site on Thursday evening. "This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available."

Java users should disable or uninstall Java immediately to mitigate any damage.

The latest flaw, as earlier reported by ZDNet, is currently being exploited in the wild, security experts have warned. Alienvault Labs have reproduced and verified claims that the new zero-day that exploits a vulnerability in Java 7, according to security expert Brian Krebs.

As you can see below we tricked the malicious Java applet to execute the calc.exe in our lab.
 

Baja28

Obama destroyed America
To disable in Firefox, go to "add ons" --> "plug ins" choose "disable" for both the java platform & the tool kit.

In IE, go to "tools" --> "manage add ons" --> scroll down to java. Mine was already disabled.
 
To disable in Firefox, go to "add ons" --> "plug ins" choose "disable" for both the java platform & the tool kit.

In IE, go to "tools" --> "manage add ons" --> scroll down to java. Mine was already disabled.

Thanks... that was easy...:yay:
 

Baja28

Obama destroyed America
wow, aint u a computer wiz now. :killingme duh.

most of em don`t even know what F5 is. lmao. don`t confuse em 2 much now. whoculdasaidthat? idk.
I'm still waiting for your stalker ass to hack me and reveal all that info you brag about knowing.

Of course it can never happen. :killingme
 

Baja28

Obama destroyed America
aw hail, it was funny, admit it.

btw SoMd was not the gig last nite, (yet neva TMI) what a backazzwards colony.

Atre u a POI now, or ya wanna be??????????????
And off you go to my iggy box with your other MPD's... Buh bye. :howdy:
 
Oracle released an update last night (update 11) that supposedly patches this particular security vulnerability. If you try to use anything that requires the java browser plugin, it should prompt you to download the update (if you reenable java in preferences / settings).

I understand why many sites use java, but I wish they didn't feel they needed to - not on the client side anyway.
 
To disable in Firefox, go to "add ons" --> "plug ins" choose "disable" for both the java platform & the tool kit.

In IE, go to "tools" --> "manage add ons" --> scroll down to java. Mine was already disabled.

One additional step for IE:
After clicking on Manage Add Ons, click the drop box to change it from Currently Loaded to ALL. Then scroll down and disable all v7 Java.
 
Can you provide a link for that?

Oracle Security Alert CVE-2013-0422

https://blogs.oracle.com/security/entry/security_alert_for_cve_2013


EDIT: I've seen claims that this vulnerability affects earlier versions, but I think those reports may have been based on misreadings of various alerts. For example, from the National Vulnerability Database:

The MBeanInstantiator in Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier allows remote attackers to execute arbitrary code via vectors related to unspecified classes that allow access to the class loader, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681.

Some may read that to mean earlier versions, but I think it's meant to refer to earlier updates of 7. That said, other versions have had their own security issues.
 
Last edited:
Top