Java Users Urged To Patch - InformationWeek
Software // Operating Systems
03:08 PM

Java Users Urged To Patch

Security researcher Daniel Wesemann says Java exploits are at an all-time high and just as dangerous as other malware.

Strategic Security Survey: Global Threat, Local Pain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)

SANS Institute security researcher Daniel Wesemann on Thursday warned Java users to wake up and patch their Java, especially in light of Oracle's recently released critical patch update bulletin. All told, last month Oracle released 29 security fixes for Java SE and Java for Business products.

The good news for anyone who's previously delayed patching is that "the latest Critical Patch Update includes all fixes from the previous Critical Patch Updates," said Oracle.

But the bad news for anyone who has yet to patch is that many of the vulnerabilities leave your PC open to malicious attacks. Visit a website that's been poisoned by attackers, and your vulnerable Java code could be exploited to automatically add a virus to your PC, or your PC to a botnet.

Last month, Microsoft issued a similar Java update appeal, warning of an "unprecedented wave" of Java exploits. Interestingly, most of those exploits targeted just three vulnerabilities, which Adobe had long since patched.

According to Wesemann, "it doesn't look like the situation has improved since, and the bad guys are taking advantage."

For example, the third most popular Java Help Center support issue was "Virus found in my Java Cache Directory." It's preceded by two other security concerns: "Can Java download be infected with a virus?" and "Why should I remove older versions of Java from my system?" (The short answer: for security and performance reasons.)

Java exploits can be just as damaging as any other type of malware attack. For example, the "bpac" family of exploits can arrive via drive-by attacks, and then download applets or a PDF, which then begin downloading executable files (EXEs).

"The EXEs pack quite a punch -- one recent sample submitted contained no less than 66 individual other malicious EXEs," said Wesemann. "Yes, a user would be bound to notice this deluge of badness, but he still wouldn't stand a chance to ever clean all of this crud off the system again."

Accordingly, "if you haven't done so yet, hunt down and patch every incarnation of Java on the PCs that you are responsible for," he said.

For organizations not able to immediately patch all Java installations, there are some workarounds. For example, security researcher David Sharpe recommends that organizations set their intrusion prevention systems to block seven exploits, since they're being seen in the wild and are utilized by some of the most popular crimeware toolkits.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll