Attacks/Breaches
1/10/2013
04:58 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Year Java Zero-Day Attacks Under Way

Weather, news, adult websites getting hit, crimeware kits loaded with new exploits using the bug

Another Java zero-day exploit is in the wild and, once again, cries of “disable Java now” are going out.

The beleaguered application has yet another new bug and is the target of attacks as several ad networks are being redirected to Blackhole exploit sites. "We have seen ads from legitimate sites, especially in the UK, Brazil, and Russia, redirecting to domains hosting the current Blackhole implementation delivering the Java 0day. These sites include weather sites, news sites, and of course, adult sites," said Kurt Baumgartner, a Kaspersky Lab expert, in a blog post today.

Word of the new bug and exploitation first came from a researcher who goes by the handle @Kafeine, and was later confirmed by several other researchers, including AlienVault Labs. @Kafeine found that the Blackhole, Cool EK, Nuclear Pack, and Red Hole crimeware kits now include exploits for the zero-day.

The nature of the flaw itself has not yet been identified, but US-CERT has issued an alert here, confirming that Java 7 Update 10 and earlier are affected and could let "a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system."

Jaime Blasco of AlienVault Labs was able to reproduce an attack with the exploit against a fully patched Java platform. "The Java file is highly obfuscated but based on the quick analysis we did the exploit is probably bypassing certain security checks tricking the permissions of certain Java classes as we saw in CVE-2012-4681," he blogged today.

No word yet from Oracle, but security experts are urging users and enterprises to disable Java browser plug-ins, as well as desktop Java apps.

"Leave Java disabled (I am not going to recommend to disable it. If you still have it enabled, you probably have an urgent business need for it and can't disable it)," Johannes Ullrich blogged in the SANS Internet Storm Center today. "If you have any business critical applications that require Java: try to find a replacement. I don't think this will be the last flaw, and the focus on Java from people behind exploit kits like blackhole is likely going to lead to additional exploits down the road."

And this is likely only the first of many Java zero-day attacks to come this year, experts say.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kbuchs559
50%
50%
kbuchs559,
User Rank: Apprentice
1/15/2013 | 4:33:46 PM
re: New Year Java Zero-Day Attacks Under Way
I'm trying to understand why there is this confusion between java browser plug-ins and java native. There is only an exploit issue with the browser plug-ins because they tried to restrict web apps from having access to things on the local machine to avoid damage. But java native has always had that access by design. You want your local java app to be able to read and write files, etc. If people are disabling java entirely, then none of their applications written in java will run.-á
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?