PCDVD數位科技討論區

PCDVD數位科技討論區 (https://www.pcdvd.com.tw/index.php)
-   七嘴八舌異言堂 (https://www.pcdvd.com.tw/forumdisplay.php?f=12)
-   -   美國警告!立即解除電腦Java,免遭駭客入侵,自遠端執行指令 (https://www.pcdvd.com.tw/showthread.php?t=997804)

E.A.G.Y.O.O 2013-01-12 02:46 AM

美國警告!立即解除電腦Java,免遭駭客入侵,自遠端執行指令
 
2013年01月11日19:21

美國國土安全部轄下的電腦資安單位CERT周日發布警告,Java升級10及之前的版本因出現漏洞,提醒下載java軟體的使用者,最好立即解除安裝,避免遭駭客入侵,自遠端執行任意指令。



美國CERT在官網發布警告,提醒消費者最好解除Java安裝。翻攝CERT網頁

chaotommy 2013-01-12 03:02 AM

三個難兄難弟
Java & Acrobat & Flash

ALPHONSE2501 2013-01-12 03:42 AM

United States Computer Emergency Readiness Team


Vulnerability Note VU#625617 - Java 7 fails to restrict access to privileged code


引用:
Overview

Java 7 Update 10 and earlier contain an unspecified vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.



Description

The Oracle Java Runtime Environment (JRE) 1.7 allows users to run Java applications in a browser or as standalone programs. Oracle has made the JRE available for multiple operating systems.

The Java JRE plug-in provides its own Security Manager. Typically, a web applet runs with a security manager provided by the browser or Java Web Start plugin. Oracle's document states, "If there is a security manager already installed, this method first calls the security manager's checkPermission method with a RuntimePermission("setSecurityManager") permission to ensure it's safe to replace the existing security manager. This may result in throwing a SecurityException".

By leveraging unspecified vulnerabilities involving Java Management Extensions (JMX) MBean components and sun.org.mozilla.javascript.internal objects, an untrusted Java applet can escalate its privileges by calling the the setSecurityManager() function to allow full privileges, without requiring code signing. Oracle Java 7 update 10 and earlier are affected.

This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available.


Impact

By convincing a user to visit a specially crafted HTML document, a remote attacker may be able to execute arbitrary code on a vulnerable system.
Solution

We are currently unaware of a practical solution to this problem. Please consider the following workarounds:

Disable Java in web browsers

Starting with Java 7 Update 10, it is possible to disable Java content in web browsers through the Java control panel applet. Please see the Java documentation for more details.
Note: Due to what appears to potentially be a bug in the Java installer, the Java Control Panel applet may be missing on some Windows systems. In such cases, the Java Control Panel applet may be launched by finding and executing javacpl.exe manually. This file is likely to be found in C:\Program Files\Java\jre7\bin or C:\Program Files (x86)\Java\jre7\bin.
Also note that we have encountered situations where Java will crash if it has been disabled in the web browser as described above and then subsequently re-enabled. Reinstalling Java appears to correct this situation.


Joss 2013-01-12 10:19 AM

看來我還是把 JRE 刪掉比較保險些。

DeepGreen 2013-01-12 10:20 AM

1. 你要有裝有Bug的java vm
2. 你要被引導到釣魚網站
3. 釣魚站上要剛剛好有攻擊這個漏洞的java applet
這不是重大流程或規格瑕疵造成的問題
很快就會被修復, 沒攻擊價值

u8526425 2013-01-12 03:43 PM

Java 7真的被攻很多次了
部份網站都建議使用者停留在Java 6比較安全
但是Java 6即將停止更新...現在到底是怎樣...

octapult 2013-01-12 08:35 PM

還好我的 Java plugin 還停留在 1.6...
奇怪的是這個不是會自動更新的嗎?

Linux 底下用的則是 IcedTea Java :D

AARONN 2013-01-12 08:39 PM

真的嗎?? 我好怕呀....我電腦裡可是有近一百TB的愛情動作片耶...

萬一這些心血毀於一旦,該怎麼辦?? :( 十年心血呀~~

ghostman 2013-01-12 08:47 PM

引用:
作者AARONN
真的嗎?? 我好怕呀....我電腦裡可是有近一百TB的愛情動作片耶...

萬一這些心血毀於一旦,該怎麼辦?? :( 十年心血呀~~

你還是擔心你老母發現會怎麼樣想吧! :mad:

k2島民 2013-01-12 09:02 PM

引用:
作者u8526425
Java 7真的被攻很多次了
部份網站都建議使用者停留在Java 6比較安全
但是Java 6即將停止更新...現在到底是怎樣...


疑?Java 6比較安全??
我看了這篇後還傻傻的更新到Java 7,只因為沒在Java 6的控制台看到他說的安全選項 :jolin:


所有的時間均為GMT +8。 現在的時間是08:48 AM.

vBulletin Version 3.0.1
powered_by_vbulletin 2025。