Early 2013 brings with it the first Java 0day mass exploit distribution of the year.
There appears to be multiple ad networks redirecting to Blackhole sites, amplifying the mass exploitation problem. We have seen ads from legitimate sites, especially in the UK, Brazil, and Russia, redirecting to domains hosting the current Blackhole implementation delivering the Java 0day. These sites include weather sites, news sites, and of course, adult sites.
When installing Java install the latest 1.7.10. It has the ability to enable or disable it in your browsers. When enabling it there are security levels to choose from.
I would say disable Java in your browsers and enable it when a site needs it (I remember only seeing on pages with scientific demos). That way you will keep drive by downloads at bay while Java is still available for the few applications that require it like Vuze and Limewire/Frostwire.
Simply disable Java in your brwosers as described in this article by Oracle. Java is not used much on the web so you may not miss it.
The latest Java 7 update 10 also supports restriction (security) levels for running Java content in browsers. I dn’t know if setting security lever to high or very high is working against this zero day vulnerability.
Just whanted to warn aboute security flaw inn Java. People use this hole to get control over your computer. Seems like the team at Oracle Leaves the holes there well knowing its there ?.. Its not the first time this happens…
Update: The currently CEO at Oracle, Larry Ellison explains inn his statement to media Saturday that it is the so-called developer tools for Java where the security flaw is located, and not the additional software most people see when such attempts to log on to their online bank’s.
Oracle is the world’s largest IT companies, with 120,000 employees. Java’s about 3 billion units and are some of the most frequently used software company has developed. Java is used in everything from smart phones to TVs and computers.
Security Environments worldwide railed against the software giant on Friday. The error encountered joins a number of other over the past years
This is the third serious security hole in Java in under a year. The bank`s will ban java forever. They are currently looking for other options if they ■■■■■ up more.
I can’t understand why, since when I go to a page that uses Java there is a Defence+ warning that pops up and tells me if I want to “allow that javaw.exe connects to xxx.yyy.zzz.234” … why this doesn’t protect me if I say “block”.
Isn’t it sufficient?
I recall removing Java from my computer last year because I had an issue with Secunia PSI. I also recall only using one website that uses Java, which is Pingtest.net. (It requires it for the packet loss test.)
For those that still use Java I’m glad to know there is an update available.
Area: deploy Synopsis: Default Security Level Setting Changed to High
The default security level for Java applets and web start applications has been increased from “Medium” to “High”. This affects the conditions under which unsigned (sandboxed) Java web applications can run. Previously, as long as you had the latest secure Java release installed applets and web start applications would continue to run as always. With the “High” setting the user is always warned before any unsigned application is run to prevent silent exploitation.
Depending on preference you can now choose to disable Java in browsers in general or set High or Very high security settings.