Attacks/Breaches
1/10/2013
04:58 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New Year Java Zero-Day Attacks Under Way

Weather, news, adult websites getting hit, crimeware kits loaded with new exploits using the bug

Another Java zero-day exploit is in the wild and, once again, cries of “disable Java now” are going out.

The beleaguered application has yet another new bug and is the target of attacks as several ad networks are being redirected to Blackhole exploit sites. "We have seen ads from legitimate sites, especially in the UK, Brazil, and Russia, redirecting to domains hosting the current Blackhole implementation delivering the Java 0day. These sites include weather sites, news sites, and of course, adult sites," said Kurt Baumgartner, a Kaspersky Lab expert, in a blog post today.

Word of the new bug and exploitation first came from a researcher who goes by the handle @Kafeine, and was later confirmed by several other researchers, including AlienVault Labs. @Kafeine found that the Blackhole, Cool EK, Nuclear Pack, and Red Hole crimeware kits now include exploits for the zero-day.

The nature of the flaw itself has not yet been identified, but US-CERT has issued an alert here, confirming that Java 7 Update 10 and earlier are affected and could let "a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system."

Jaime Blasco of AlienVault Labs was able to reproduce an attack with the exploit against a fully patched Java platform. "The Java file is highly obfuscated but based on the quick analysis we did the exploit is probably bypassing certain security checks tricking the permissions of certain Java classes as we saw in CVE-2012-4681," he blogged today.

No word yet from Oracle, but security experts are urging users and enterprises to disable Java browser plug-ins, as well as desktop Java apps.

"Leave Java disabled (I am not going to recommend to disable it. If you still have it enabled, you probably have an urgent business need for it and can't disable it)," Johannes Ullrich blogged in the SANS Internet Storm Center today. "If you have any business critical applications that require Java: try to find a replacement. I don't think this will be the last flaw, and the focus on Java from people behind exploit kits like blackhole is likely going to lead to additional exploits down the road."

And this is likely only the first of many Java zero-day attacks to come this year, experts say.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kbuchs559
50%
50%
kbuchs559,
User Rank: Apprentice
1/15/2013 | 4:33:46 PM
re: New Year Java Zero-Day Attacks Under Way
I'm trying to understand why there is this confusion between java browser plug-ins and java native. There is only an exploit issue with the browser plug-ins because they tried to restrict web apps from having access to things on the local machine to avoid damage. But java native has always had that access by design. You want your local java app to be able to read and write files, etc. If people are disabling java entirely, then none of their applications written in java will run.-á
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?