- Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable. This vulnerability affects Java 7 (1.7) Update 0 to 6. Does NOT affect Java 6 and below.
- The publicly available exploits work on all versions of Internet Explorer, Firefox, and Opera. It also works on Chrome in Windows XP, Safari on OS X 10.7.4.
(Read more: APT Secrets that Vendors Don't Tell)
- This vulnerability is being actively exploited in the wild, and exploit code is publicly available.
- By convincing a user to visit a specially crafted HTML document, a remote attacker may be able to execute arbitrary code on a vulnerable system and thus install malware including remotely controllable trojans and rootkits.
Disabling the Java browser plugin may prevent a malicious webpage from exploiting this vulnerability.
- Apple Safari: How to disable the Java web plug-in in Safari
- Firefox: How to turn off Java applets
- Microsoft Internet Explorer: Refer to the Java documentation for more details. In the Windows Control panel, open the Java item. Select the “Java” tab and click the “View” button. Uncheck “enabled” for any JRE version listed. Or you can also check the following link.
- Chrome: See the “Disable specific plug-ins” section of the Chrome documentation for how to disable Java in Chrome.
(Watch more : An approach to present IT Risk as Business Risk)
Use NoScript
Using the Mozilla Firefox NoScript extension to whitelist web sites that can run scripts and access installed plugins will mitigate this vulnerability. See the NoScript FAQ for more information.
“If I hear another clueless IT person tell someone to disable JavaScript when they mean Java, I will prepare my blowtorch.”
References:
Comments