Feeds

back to article Java code-execution vuln exploited in drive-by attack

A popular song lyrics website has been found serving attack code that tries to exploit a critical vulnerability in Oracle's Java virtual machine, which is installed on hundreds of millions of computers worldwide. The site, songlyrics.com, is serving up javascript that invokes the weakness disclosed last week by security …

COMMENTS

This topic is closed for new posts.
Grenade

D'oh!

brought to you by Oracle Corp.

0
0
Silver badge
Flame

Don't call now...

Larry is on a yacht in the middle of the Indian Ocean and can't be bothered.

0
0
Anonymous Coward

Last Nail Into The Coffin

...of Browser-based Java.

I would have expected Larry to personally direct someone to fix this issue UNTIL NEXT MORNING 10:00.

Apparently the fix is clear - validate the input to the web start *.jar downloading mechanism. They could have added a config file that allows you to enable the old mechanism for selected source hosts, to be 100% sure end users can re-enable legacy apps.

As Oracle apparently has much more important priorites, I suggest they just throw away all the client-side java stuff. Users will disable it anyhow, now. Or not install Java after being hacked and having had to reinstall their PC.

I just removed Java for good from my machine.

1
0
Anonymous Coward

Hrm..

Another job for noscript, or if possible, just not having f'king Java installed.

0
0
FAIL

Research fail

"The vulnerability has existed since April 2008, when Sun introduced the Java Web Start feature in Java 6, update 10."

They introduced Web Start in Java 1.4, they updated it in 6u10. The question becomes, does this mean users of Java 5 are safe?

0
0

Re: Research fail

"They introduced Web Start in Java 1.4, they updated it in 6u10. The question becomes, does this mean users of Java 5 are safe?"

Correct about initial release of JWS. The issue with 6u10, which introduced this "vulnerability by design" was that they made JWS more directly accessible, via the "Deployment Toolkit" ActiveX control (for IE) and the equivalent NPAPI plugin for (most) other browsers. This current exploit depends on the 6u10+ "improvement" in JWS functionality.

0
0
Troll

Maybe they could outsource...

to Adobe?

Adobe are perfect, and will sue anyone who says they aren't!

0
0
Badgers

Disable Java and JDT

Disabling Java _and_ the Java Deployment Toolkit plugin should work for Firefox.

Java isn't magic - Firefox can't handle JNLP without a plugin any more than it can handle Flash by itself.

0
0
WTF?

java != javascript

"The site, songlyrics.com, is serving up javascript"

"Short of uninstalling Java altogether, it's not easy to prevent"

really? FF+NoScript wouldn't prevent it?

0
0
Grenade

javascript not required!

The vulnerability does not require javascript, plain html tags is enough...

0
0
WTF?

What are oracle doing?

The security sandbox of Java is supposed to be one of its main selling points...

Pull your finger out and fix it, you bellends.

0
0
Go

Why all the fuss ?

It's fixed and released. JRE 6u20 is out.

http://java.sun.com/javase/downloads/index.jsp

0
0
FAIL

@Why all the fuss ?

First Oracle did not display a determination to fix the bug immediately. And according to some reports, it does NOT fix the issue:

http://www.heise.de/newsticker/meldung/Java-Luecke-Spiel-mir-das-Lied-vom-Trojaner-Update-978119.html

"Das Java-Update führt offenbar nicht in allen Fällen dazu, dass der bekannte Exploit nicht mehr funktioniert. Die Ursache ist derzeit unklar. Alternativ hilft es weiterhin, beim Internet Explorer das Killbit für das verantwortliche ActiveX-Control zu setzen, beispielsweise indem man folgenden Text in der Datei kill.reg speichert und die Datei dann doppelklickt:"

English: ..Apparently the fix does not always work...disable plugin with killbit....

0
0
This topic is closed for new posts.