US-CERT Alert TA12-240A - Oracle Java 7 Security Manager Bypass Vulnerability

28/08/12, US-CERT Alert TA12-240A - Oracle Java 7 Security Manager Bypass Vulnerability
From: US-CERT Alerts <technical-alerts@us-cert.gov>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: technical-alerts@us-cert.gov
Subject: US-CERT Alert TA12-240A - Oracle Java 7 Security Manager Bypass Vulnerability
From: US-CERT Alerts <technical-alerts@us-cert.gov>
Date: Tue, 28 Aug 2012 00:14:00 -0400
Authentication-results: mail.cs.ait.ac.th (amavisd-new); dkim=pass header.i=@us-cert.gov
Delivered-to: on@cs.ait.ac.th
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/simple; d=us-cert.gov; s=ye2ramdjwkxu; t=1346127496; bh=Q+lv9mJQ4R4LPCOtgGvYZ4m9FStgULhcrSqpvI8FfZg=; h=Date:Message-Id:From:To:Subject:Sender:Reply-To:Cc:In-Reply-To: References; b=Lal511iIf2DMvSWT/VdJ3lPR3Y1QYwnJTyrd4pHadzIov1wsQzRDegFFeBb25yh1a Uj/wumdTKVyOHi4pKije1jPXo9cCzVXbfCxbUBt8ym2M45jD/fk//fhOiAQS0VBFya Q//szkfm4NffrIBgAjR4dKfGF3f/htfpOc8k29y8=
List-archive: <http://www.us-cert.gov/cas/techalerts>
List-help: <http://www.us-cert.gov/cas/#tech>, <mailto:Majordomo@us-cert.gov?body=help>
List-id: US-CERT Alerts <technical-alerts.us-cert.gov>
List-post: NO (posting not allowed on this list)
List-subscribe: <mailto:Majordomo@us-cert.gov?body=subscribe%20technical-alerts>
List-unsubscribe: <mailto:Majordomo@us-cert.gov?body=unsubscribe%20technical-alerts>
Organization: US-CERT - +1 202-205-5266

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Awareness System

US-CERT Alert TA12-240A
Oracle Java 7 Security Manager Bypass Vulnerability

Original release date: August 27, 2012
Last revised: --

Systems Affected

     Any system using Oracle Java 7 (1.7, 1.7.0) including:

     * Java Platform Standard Edition 7 (Java SE 7)
     * Java SE Development Kit (JDK 7)
     * Java SE Runtime Environment (JRE 7)

     Web browsers using the Java 7 Plug-in are at high risk.


Overview

   A vulnerability in the way Java 7 restricts the permissions of Java
   applets could allow an attacker to execute arbitrary commands on a
   vulnerable system.


Description

   A vulnerability in the Java Security Manager allows a Java applet
   to grant itself permission to execute arbitrary operating system
   commands. An attacker could use social engineering techniques to
   entice a user to visit a link to a web site hosting a malicious
   applet.

   Any web browser using the Java 7 Plug-in is affected.

   Reports indicate this vulnerability is being actively exploited,
   and exploit code is publicly available.


Impact

   By convincing a user to load a malicious Java applet, an attacker
   could execute arbitrary operating system commands on a vulnerable
   system with the privileges of the Java Plug-in process.


Solution

   Disable the Java Plug-in

   Disabling the Java web browser plug-in will prevent Java applets
   from from running. Here are instructions for several common web
   browsers:

   * Apple Safari: How to disable the Java web plug-in in Safari

   * Mozilla Firefox: How to turn off Java applets

   * Google Chrome: See the "Disable specific plug-ins" section of the
     Chrome Plug-ins documentation.

   * Microsoft Internet Explorer: Change the value of the
     UseJava2IExplorer registry key to 0. Depending on the versions of
     Windows and the Java plug-in, the key can be found in these
     locations:

       HKLM\Software\JavaSoft\Java Plug-in\{version}\UseJava2IExplorer

       HKLM\Software\Wow6432Node\JavaSoft\Java Plug-in\{version}\UseJava2IExplorer
   
   * The Java Control Panel (javacpl.exe) does not reliably configure
     the Java plug-in for Internet Explorer. Instead of editing the
     registry, it is possible to run javacpl.exe as Administrator,
     navigate to the Advanced tab, Default Java for browsers, and use
     the space bar to de-select the Microsoft Internet Explorer option.

   Use NoScript

   NoScript is a browser extension for Mozilla Firefox browsers that
   provides options to block Java applets.


References

 * Vulnerability Note VU#636312
   <http://www.kb.cert.org/vuls/id/636312>

 * Zero-Day Season is Not Over Yet
   <http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html>

 * Let's start the week with a new Java 0-day in Metasploit
   <https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day>

 * http://pastie.org/4594319
   <http://pastie.org/4594319>

 * The Security Manager
   <http://docs.oracle.com/javase/tutorial/essential/environment/security.html>

 * Java 7 0-Day vulnerability information and mitigation.
   <http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html>

 * How to disable the Java web plug-in in Safari
   <https://support.apple.com/kb/HT5241>

 * How to turn off Java applets
   <https://support.mozilla.org/en-US/kb/How%20to%20turn%20off%20Java%20applets>

 * NoScript
   <http://noscript.net/>


Revision History

  August 27, 2012: Initial release

 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA12-240A Feedback VU#636312" in
   the subject.
 ____________________________________________________________________

   Produced by US-CERT, a government organization.
 ____________________________________________________________________

This product is provided subject to this Notification: 
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy: 
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA12-240A.html

For instructions on subscribing to or unsubscribing from this 
mailing list, visit http://www.us-cert.gov/cas/signup.html


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUDwzD3dnhE8Qi3ZhAQIhCwgAoB6PY2SMOBk9HEm0kNLm0aYD+YNJ/JjE
76KMWFPbtKd6I4hgMsjgIj6Y9a9fObk3tI+WAZ9cUrtw7I0/rnFJ33hEa24EdAZi
FrC+8WYJulBssl2t/+GXW+jnWymgv3wm8B75A5ykXp6K/Xg0LDH7Xpe1tgPI7ojJ
9Wut8xfoKknzm3s6mEuVrZUpN8cGJzDi4E1CqGdQPUEcBBSnwIpbNVTdfsSLlaEX
st2VpWpC2Nd/WrcakJoQhC2ehvi3osEEXL6AAX88G7ixUg9E+aS2G+JiUQ2/DDKD
zD8dq/LaX7aZldPgbbLsuJHWnN2/gmWnjUMYnFjHbSpCcLGphnfQiQ==
=3Q1B
-----END PGP SIGNATURE-----



Previous message sorted by date: US-CERT Alert TA12-227A - Microsoft Updates for Multiple Vulnerabilities
Next message sorted by date: US-CERT Alert TA12-251A - Microsoft Update For Minimum Certificate Key Length
Previous message sorted by thread: US-CERT Alert TA12-227A - Microsoft Updates for Multiple Vulnerabilities
Next message by thread: US-CERT Alert TA12-251A - Microsoft Update For Minimum Certificate Key Length
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Nov 2012