Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/31/2012
12:06 PM
50%
50%

Security Experts: Java Should Be Disabled Unless Necessary

Security researchers say Java's popularity as an attack vector means it should be disabled unless it is needed

Since the acquisition of Sun Microsystems a few years ago, Oracle has found itself tasked with protecting a technology that has increasingly come under the gun from attackers -- Java. According to security researchers, Java's popularity as an attack vector means it's time for organizations to disable it unless there is a strong use case.

"As it happens, very few websites rely on Java for dynamic content," says Tod Beardsley, Metasploit engineering manager at Rapid7. "Java isn't relied on nearly as much as Javascript and Flash. Most people can disable their Java browser plug-in and not really notice the difference."

The bugs at the center of much of the latest drama are CVE-2012-4681, which Oracle patched Thursday amid growing anxiety. However, there is a report that researchers from security vendor Security Explorations have found a vulnerabilityin the update that can be exploited to escape the Java sandbox and execute code.

In any case, hackers had been targeting CVE-2012-4681 for at least the previous week, and had incorporated exploits for the bug into a number of exploit kits, including Black Hole, Sweet Orange, and others.

[ Hundreds of domains are serving up the latest Java attack, with tens of thousands of new victim machines since the exploit was added to the BlackHole toolkit. See New 'Reliable' Java Attack Spreading Fast, Uses Two Zero-Day Bugs. ]

"Just about all other kits on the black market use Java, Phoenix, Eleonore, RedKit, and Sakura are just a few examples," says Chris Astacio, manager of security research at Websense. "In fact, some kits use exclusively Java to attack clients. The reason for this is that Java provides the highest infection rate of all the other vulnerabilities used -- perhaps even two to three times more successful than the next most vulnerable application."

Like Beardsley, Astacio says that most people do not really need Java for day-to-day use, and that lack of need is the reason many in the security community suggests disabling or removing it -- though that can create issues of its own in some cases.

"If an organization removes it all together, they are increasing their security posture because that's one less vector to worry about attackers getting into their organization," he says. "The issue for some organizations with disabling Java is that they may have custom applications which use it. For this purpose, many in the security community have suggested using two browsers, one for day-to-day browsing, which has Java disabled, and another with Java enabled, but for the specific use of such applications that require it."

Besides CVE-2012-4681, the most commonly exploited Java vulnerabilities of late have been CVE-2012-1723 -- which was been very popular among the BlackHole crowd, and CVE-2012-0507, which is mostly known for its use in the Flashback attacks, Satnam Narang, security response manager at Symantec, tells Dark Reading. Both of those vulnerabilities have been patched by Oracle. If there is a use case for having Java installed, it is best to ensure that it is up-to-date, he said.

While Java users face some security challenges due to the software's popularity as an attack vector, Beardsley says he is very pleased with the speed of Oracle's reaction to the latest zero-day.

"Oracle has about a zillion clients all running various versions of their many software offerings, so patch deployment is understandably complicated for them," he says. "That said, it would be nice to see them on a more flexible once-a-month cycle like other major software vendors. It's painful to get there, but it's certainly possible."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...