Risk
1/14/2013
10:17 AM
Connect Directly
RSS
E-Mail
50%
50%

Oracle Fixes Zero Day Java Flaws: Patch Now

Java 7 update, released Sunday, fixes bugs widely targeted by crimeware toolkits. Other critical bug updates coming later this week from Oracle and Microsoft.

Oracle released an out-of-band patch Sunday to fix two zero-day vulnerabilities in Java that are being actively exploited by attackers.

A security alert from Oracle said that the patched vulnerabilities include CVE-2013-0422 (Oracle Java 7 Security Manager Bypass Vulnerability) as well as "another vulnerability affecting Java running in Web browsers." The Java update also changes the default security level for browser-based Java applets and applications from "medium" to "high," which means that any unsigned Java Web apps won't run without a user's approval. Oracle said the change is meant "to prevent silent exploitation.”

All Java users should apply the update as soon as possible, according to the Oracle security advisory, "due to the severity of these vulnerabilities, the public disclosure of technical details and the reported exploitation of CVE-2013-0422 'in the wild.'" Indeed, in recent days Symantec has reported seeing about 300,000 related attacks per day launched by exploit kits. The attacks predominantly target PC users based in the United States.

The patched Java vulnerabilities were first spotted last week by security researchers, who warned that they were being actively exploited by attackers. By Friday, related exploit capabilities had been added to the Blackhole, Cool Exploit Kit, Impact and Redkit crimeware toolkits, and also incorporated into Metasploit, a free, open source penetration testing framework.

[ Is hacktivism protected by the First Amendment? See Anonymous Says DDoS Attacks Like Free Speech. ]

Which versions of Java are at risk? Oracle said Sunday that the two zero-day vulnerabilities affect only Java 7 running in Web browsers. "These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications," according to the security advisory. "They also do not affect Oracle server-based software." Specifically, Oracle said the vulnerabilities are present in Java Development Kit (JDK) and Java Runtime Environment (JRE) version 7, update 10 and earlier -- but not in Java 6, 5.0 or 1.4.2. In addition, "Java SE Embedded JRE releases are not affected," said Oracle.

Veteran Java bug hunter Adam Gowdiak, who heads Security Explorations, confirmed via email Monday that Oracle's fix is sound. "The version released [Sunday] blocks the recent Java 0-day exploit code," he said.

Interestingly, at least one of the flaws patched by Oracle resulted from the company failing to fully fix a previous flaw -- disclosed to the company last year by Gowdiak -- that it supposedly patched in October. The episode recalls a Java 7 fix from Oracle released last year that patched one flaw, but introduced another.

The zero-day bugs in Java that were publicly disclosed last week are the latest in a long line of zero-day vulnerabilities that have been discovered in the software. Since Java is widely installed and runs on multiple platforms, it appears to have become a favorite target of attackers, who can potentially exploit new vulnerabilities not only on Windows systems, but also Mac OS X and Linux systems.

After last week's discovery of the latest zero-day vulnerabilities, the Department of Homeland Security (DHS) Thursday recommended temporarily disabling Java until an effective mitigation technique or patch was released. The DHS recommendation appears to be its standard advice for any critical flaw in widely used software that's being actively exploited by attackers, for which no mitigation techniques or patches are immediately available.

Apple, meanwhile, Friday took the unusual step of updating its OS X malware definitions list to not block a virus, but rather all versions of Java prior to 1.7.10.19. "This updated definition temporarily disabled the Java Web Start browser plug-in that enables Java applications to run inside of Safari/Firefox/Chrome," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. Similarly, Mozilla updated its click-to-play settings list to include Java, meaning that any attempt to launch Java -- malicious or not -- will require that a user authorize the request.

It will be a big month for Oracle patches, as the company's next critical patch update release is scheduled for Tuesday. According to Oracle's pre-release announcement, "this Critical Patch Update contains 86 new security vulnerability fixes across hundreds of Oracle products." Oracle said one of the patches is for a flaw in Oracle Database Mobile Server -- as well as Database Lite Server -- which may allow attackers to remotely execute arbitrary code with no user input.

Oracle isn't the only technology giant set to issue emergency patches for zero-day flaws this month. Microsoft announced Sunday that it plans to release a fix Monday for a zero-day vulnerability in Internet Explorer. While Microsoft hasn't detailed which bug it's fixing, the company noted that the critical vulnerability could be automatically exploited to run arbitrary code without any user interaction, meaning that it could be used to exploit PCs via self-propagating worms, drive-by attacks from malicious Web pages or when a user opens an email.

According to Paul Ducklin, head of technology for Sophos in the Asia Pacific region, the patch is most likely for a zero-day flaw in IE that was confirmed on Dec. 29 by Microsoft. The company had already published a FixIt tool to mitigate the vulnerability, and recommended that businesses harden their Windows installation by using its Enhanced Mitigation Experience Toolkit (EMET).

Even so, "there are reports that variants of this exploit exist that work even if you are using EMET, and even after you have run Microsoft's abovementioned FixIt, said Ducklin in a blog post. But luckily, the bug that Microsoft is most likely patching isn't present in the latest versions of IE. "The 2794220 vulnerability affects neither IE 9 nor IE 10. If you're already using one of those versions, you're sitting pretty," he said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DavidGP
50%
50%
DavidGP,
User Rank: Apprentice
1/18/2013 | 4:49:36 PM
re: Oracle Fixes Zero Day Java Flaws: Patch Now
I see 7u11 but no new 6 yet, 6u38 is older.
Mathew
50%
50%
Mathew,
User Rank: Apprentice
1/16/2013 | 10:27:52 AM
re: Oracle Fixes Zero Day Java Flaws: Patch Now
Andrew, Apple Friday blocked all then-current/former versions of the Java browser plug-in. That meant that anyone who wanted to use the Java browser plug-in needed to wait until Java issued its fix (which it did Sunday), then download and install it. So it was a proactive security move on Apple's part, which isn't surprising given how many people the Flashback malware infected.
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
1/15/2013 | 9:34:57 PM
re: Oracle Fixes Zero Day Java Flaws: Patch Now
Any explanation yet as to why Apple did what they did? From what I've seen/heard, if you drop back to an older version of Java that isn't prone to this exploit, you should be fine - as long as you don't allow it to auto-update. But, Apple now has them marked as "bad actors" as well.

Microsoft putting out a patch that fixes something under very specific circumstances isn't new.

I have to wonder if Oracle should look into a third party validating their patches prior to release - especially since the entire world runs on Java these days.

Andrew Hornback
InformationWeek Contributor

Mathew
50%
50%
Mathew,
User Rank: Apprentice
1/15/2013 | 2:25:56 PM
re: Oracle Fixes Zero Day Java Flaws: Patch Now
Thanks for your comment. Good point -- one of the flaws was "addressed" (as in, not really solved) by changing the default security levels. The other flaw was fixed outright. We'll be addressing this in a forthcoming story.
majenkins
50%
50%
majenkins,
User Rank: Apprentice
1/14/2013 | 9:19:53 PM
re: Oracle Fixes Zero Day Java Flaws: Patch Now
The Java update also changes the default security level for browser-based Java applets and applications from "medium" to "high,"

Actually the change in the security level is all the fix does, that is why many folks are still advising to uninstall JAVA comletely.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.