Attacks/Breaches
1/10/2013
04:58 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Year Java Zero-Day Attacks Under Way

Weather, news, adult websites getting hit, crimeware kits loaded with new exploits using the bug

Another Java zero-day exploit is in the wild and, once again, cries of “disable Java now” are going out.

The beleaguered application has yet another new bug and is the target of attacks as several ad networks are being redirected to Blackhole exploit sites. "We have seen ads from legitimate sites, especially in the UK, Brazil, and Russia, redirecting to domains hosting the current Blackhole implementation delivering the Java 0day. These sites include weather sites, news sites, and of course, adult sites," said Kurt Baumgartner, a Kaspersky Lab expert, in a blog post today.

Word of the new bug and exploitation first came from a researcher who goes by the handle @Kafeine, and was later confirmed by several other researchers, including AlienVault Labs. @Kafeine found that the Blackhole, Cool EK, Nuclear Pack, and Red Hole crimeware kits now include exploits for the zero-day.

The nature of the flaw itself has not yet been identified, but US-CERT has issued an alert here, confirming that Java 7 Update 10 and earlier are affected and could let "a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system."

Jaime Blasco of AlienVault Labs was able to reproduce an attack with the exploit against a fully patched Java platform. "The Java file is highly obfuscated but based on the quick analysis we did the exploit is probably bypassing certain security checks tricking the permissions of certain Java classes as we saw in CVE-2012-4681," he blogged today.

No word yet from Oracle, but security experts are urging users and enterprises to disable Java browser plug-ins, as well as desktop Java apps.

"Leave Java disabled (I am not going to recommend to disable it. If you still have it enabled, you probably have an urgent business need for it and can't disable it)," Johannes Ullrich blogged in the SANS Internet Storm Center today. "If you have any business critical applications that require Java: try to find a replacement. I don't think this will be the last flaw, and the focus on Java from people behind exploit kits like blackhole is likely going to lead to additional exploits down the road."

And this is likely only the first of many Java zero-day attacks to come this year, experts say.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kbuchs559
50%
50%
kbuchs559,
User Rank: Apprentice
1/15/2013 | 4:33:46 PM
re: New Year Java Zero-Day Attacks Under Way
I'm trying to understand why there is this confusion between java browser plug-ins and java native. There is only an exploit issue with the browser plug-ins because they tried to restrict web apps from having access to things on the local machine to avoid damage. But java native has always had that access by design. You want your local java app to be able to read and write files, etc. If people are disabling java entirely, then none of their applications written in java will run.-
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

CVE-2014-3991
Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) dol_use_jmobile, (2) dol_optimize_smallscreen, (3) dol_no_mouse_hover, (4) dol_hide_topmenu, (5) dol_hide_leftmenu, (6) mainmenu, or (7) leftmenu pa...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.