Skip to main content

New security protection, fixes for 39 exploitable bugs coming to Java


RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56

Latest version is designed to help users block more Java exploits on websites.

by Dan Goodin - Apr 15 2013, 4:30pm EDT arstechnica

 
Oracle plans to release an update for the widely exploited Java browser plugin. The update fixes 39 critical vulnerabilities and introduces changes designed to make it harder to carry out drive-by attacks on end-user computers.
The update scheduled for Tuesday comes as the security of Java is reaching near-crisis levels. Throughout the past year, a series of attacks hosted on popular websites has been used to surreptitiously install malware on unwitting users' machines. The security flaws have been used to infect employees of Facebook and Apple in targeted attacks intended to penetrate those companies. The vulnerabilities have also been exploited to hijack computers of home and business users. More than once, attackers have exploited one previously undocumented bug within days or weeks of patching a previous "zero-day," as such vulnerabilities are known, creating a string of attacks on the latest version of the widely used plugin.
In all, Java 7 Update 21 will fix at least 42 security bugs, Oracle said in a pre-release announcement. The post went on to say that "39 of those vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password." The advisory didn't specify or describe the holes that will be patched. Security Exploration, a Poland-based security company that has discovered dozens of "security issues" in Java, has a running list of them here.
 
Full Article
 
TH

13 replies

shorTcircuiT
Gold VIP
  • Gold VIP
  • 7721 replies
  • April 15, 2013
39 more fixes?  Wow... it has not been a good last few months for them.  Thank you as always for the updates Daniel!

RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56
You're Welcome David ;)
 
Daniel

RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56

Oracle Java SE Critical Patch Update Pre-Release Announcement - April 2013

 
Will be released on Tuesday, April 16, 2013.
 
TH
 
 
 
 

pegas
Gold VIP
  • Gold VIP
  • 1445 replies
  • April 16, 2013
Thanks Daniel for the information.
 
As a forced Java user, will update as soon as the patch is out.

  • Bronze VIP
  • 1525 replies
  • April 16, 2013
Thanks for the info Daniel.:) I don't have Java. So no worries. But still good thing they are patching up.:D

RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56

Java Applet & Web Start - Code Signing

 

Starting with Java SE 7 Update 21 in April 2013 all Java Applets and Web Start Applications are encouraged to be signed with a trusted certificate.
 
Full Article
 
TH

pegas
Gold VIP
  • Gold VIP
  • 1445 replies
  • April 16, 2013
Thanks Daniel. I am surprised that use of trusted certificates wasn't already mandatory :S I hope it will improve Java security.

RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56
@ wrote:
Thanks Daniel. I am surprised that use of trusted certificates wasn't already mandatory :S I hope it will improve Java security.
I hope so for Oracle's sake it's been a nutty year with Java exploits. :@
 
Daniel

Rakanisheu Retired
I dont have Java installed on my home PC. I had enough of it and got rid of it. Also dont use Adobe Reader and I have most flash content blocked too 😃

RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56
How to protect your computer against dangerous Java Applets.
 
Java exploits represent a common attack vector used by the bad guys to infiltrate vulnerable computers via the web browser. We wrote about the rise of Java exploits as early as 2010, and we haven't seen that trend decline. In fact, in the first quarter of 2013 alone, we've seen three Java remote code execution vulnerabilities being exploited in the wild: CVE-2013-0422, CVE-2013-0431, and CVE-2013-1493. In response, Oracle recently introduced a new security feature regarding the way unsigned Java applets and web start applications are run in the release of Java 7 update 11. The text in Oracle's release notes reads:
Synopsis: Default Security Level Setting Changed to High.
The default security level for Java applets and web start applications has been increased from "Medium" to "High". This affects the conditions under which unsigned (sandboxed) Java web applications can run. Previously, as long as you had the latest secure Java release installed applets and web start applications would continue to run as always. With the "High" setting the user is always warned before any unsigned application is run to prevent silent exploitation.
Today, the vast majority of applets exploiting security vulnerabilities are not signed; this basically means that every time a user opens a webpage that tries to load an unsigned applet (which is a classic exploitation scenario), there is a risk that the computer will get infected. This scenario is known as a drive-by attack.
This new security enhancement eliminates the risk of silent exploitation using drive-by attacks via unsigned applets, which were possible before Java 7 update 11. This leaves attackers with no choice but to use social engineering techniques to convince users to click the Run button on the security warning dialog (displayed below). While still possible, it's no longer as easy for them to infect your computer.
With the new security enhancement, the following dialog box appears when you visit a webpage hosting an unsigned Java applet:
http://www.microsoft.com/security/portal/blog-Images/Java_dialog/1.png
If you don't expect to see an applet on the page, we strongly advise you to click Cancel. In fact, we advise you to click Cancel by default for untrusted pages (don't check the "Do not show this again for this app" box), check the loaded webpage, and choose Run only if you truly believe that the applet is risk free, that is:
  1. It is the webpage you expected to see.
  2. The URL in the dialog box matches with the URL of the page you're viewing (in case the dialog originated from another browser tab).
  3. The applet was not hidden and you see the text: [img]http://www.microsoft.com/security/portal/blog-Images/Java_dialog/2.png[/img] in the location where the applet's canvas should have been painted.
Keep in mind that in case the webpage tries to load multiple applets, there's going to be one dialog box for every applet. We recommend you assess each one individually. You can then hit the refresh button on your browser when you're done, and when the security warning dialog reappears, you can click OK if you think the applet is safe.
What about self-signed Java applets? These applets, although signed, do not use a certificate from a recognized certificate authority, hence they still require your approval to run. This is also a known scenario used by attackers (we detect variants used in these kinds of attacks as TrojanDownloader:Java/Toniper). In such a situation, the following dialog box will appear:
http://www.microsoft.com/security/portal/blog-Images/Java_dialog/3.png
As you can see, in the self-signed scenario the warning is presented in an even more clear fashion, as opposed to the previous unsigned warning where it didn't clearly state the risk. Signed applets run as trusted code, without any restrictions, and can run arbitrary code on your computer. This means that a signed applet doesn't need to exploit a vulnerability to potentially take control of your computer. It just needs to be allowed to execute.
Again, in this scenario, we recommend that you click Cancel for untrusted webpages. However, note that clicking Cancel on this dialog doesn't mean you don't allow it to execute, only that you're not allowing this applet to run with full access. After clicking Cancel another dialog will pop up, like the one presented in the first picture, which asks you if you will allow it to execute. It is because of this that it is imperative that whenever you are redirected to such a page, you do not allow the applet to run initially. Please see steps 1 to 3 described above on how to properly assess the situation and decide whether to allow the applet to run or not.
As it stands today, thanks to Java 7 update 11, only Java applets signed with a trusted certificate are allowed to run without asking the user's permission, if not requesting full permissions. It is uncommon to see malicious trusted signed Java applets. To protect yourself in all scenarios we strongly advise you to use an up-to-date antivirus solution and software (e.g. Java Runtime), and follow best practices when browsing the Internet, especially on opening links coming from untrusted sources.
Also, starting with Java 7 update 21, planned for today, April 16, 2013, the look and feel of the above dialog boxes will change slightly to further highlight the potential danger of running unsigned code. Please read more here and see how the new dialog boxes will look here.
Kudos to our friends in Oracle for taking these steps to improve Java security.
 
Marian Radu
MMPC Munich

Microsoft Malware Protection Center
 
 
TH

  • Bronze VIP
  • 1525 replies
  • April 17, 2013
@ wrote:
I dont have Java installed on my home PC. I had enough of it and got rid of it. Also dont use Adobe Reader and I have most flash content blocked too :D
Exactly what I do except for I allow all flash content. I only read pdf files and use Firefox browser's built in pdf reader for that purpose.:)

  • Bronze VIP
  • 1525 replies
  • April 17, 2013
@TH
Thanks a lot for the article. Very important.

pegas
Gold VIP
  • Gold VIP
  • 1445 replies
  • April 17, 2013
Thanks Daniel for the guide.
 
I am pleased to see all the security measures brought with update 21. I feel more secured. Though, I wonder why it couldn't be introduced much earlier.

Reply