[新聞] Java又有新漏洞,美國土安全部建議停用Jav

看板AntiVirus (防毒)作者 (真˙詭島online)時間13年前 (2013/01/11 21:41), 編輯推噓4(407)
留言11則, 9人參與, 最新討論串1/1
繼上次1.7.0_06爆發安全漏洞之後,這次1.7.0_10又爆發新的漏洞(含之前版本)。 這次新漏洞嚴重到只要逛到惡意網頁,電腦就會被壞人接管。 這次漏洞是跨平台的,包括Windows, Linux和Mac OSX等全部都完蛋。 由於事態嚴重,美國土安全部 暴氣了,直接叫大家移除停用JAVA。 Java漏洞恐遭駭 專家籲解除安裝 路透社 – 2013年1月11日 http://tinyurl.com/bcexrxj (路透紐約10電)受廣泛使用的甲骨文公司(Oracle Corp)Java軟體 被發現有1個安全漏洞,且駭客正以此攻擊電腦,安全專家建議,電腦用 戶應停用Java。 全球有數億台電腦安裝Java軟體,它是種電腦語言,可以讓程式開發人 員用1種程式碼編寫軟體,且幾乎與每種電腦都可相容。 3名電腦安全專家今天告訴路透社,電腦用戶應該解除安裝Java,以避 免受到攻擊。 安全公司 AlienVault Labs實驗室經理布拉斯科(Jaime Blasco)說: 「Java一團糟,並不安全。」「你必須解除安裝。」 網路安全供應商Rapid7的首席安全主管摩爾(HDMoore)表示,採用Mac OS X、Linux、Windows等系統的電腦似乎都無法對攻擊免疫。 甲骨文發言人表示無法立即就此事置評。 美國官方發佈警告,趕快停用Java Oracle Java 7 Security Manager Bypass Vulnerability http://www.us-cert.gov/cas/techalerts/TA13-010A.html Systems Affected Any system using Oracle Java 7 (1.7, 1.7.0) including Java Platform Standard Edition 7 (Java SE 7) Java SE Development Kit (JDK 7) Java SE Runtime Environment (JRE 7) All versions of Java 7 through update 10 are affected. Web browsers using the Java 7 plug-in are at high risk. Overview A vulnerability in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system. Description A vulnerability in the Java Security Manager allows a Java applet to grant itself permission to execute arbitrary code. An attacker could use social engineering techniques to entice a user to visit a link to a website hosting a malicious Java applet. An attacker could also compromise a legitimate web site and upload a malicious Java applet (a "drive-by download" attack). Any web browser using the Java 7 plug-in is affected. The Java Deployment Toolkit plug-in and Java Web Start can also be used as attack vectors. Reports indicate this vulnerability is being actively exploited, and exploit code is publicly available. Further technical details are available in Vulnerability Note VU#625617. Impact By convincing a user to load a malicious Java applet or Java Network Launching Protocol (JNLP) file, an attacker could execute arbitrary code on a vulnerable system with the privileges of the Java plug-in process. Solution Disable Java in web browsers This and previous Java vulnerabilities have been widely targeted by attackers, and new Java vulnerabilities are likely to be discovered. To defend against this and future Java vulnerabilities, disable Java in web browsers. Starting with Java 7 Update 10, it is possible to disable Java content in web browsers through the Java control panel applet. From Setting the Security Level of the Java Client: For installations where the highest level of security is required, it is possible to entirely prevent any Java apps (signed or unsigned) from running in a browser by de-selecting Enable Java content in the browser in the Java Control Panel under the Security tab. If you are unable to update to Java 7 Update 10 please see the solution section of Vulnerability Note VU#636312 for instructions on how to disable Java on a per browser basis. -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 218.211.154.48

01/11 23:56, , 1F
感謝分享,已移除.前幾天才想說安全性應該有改進了才裝= =
01/11 23:56, 1F

01/12 01:35, , 2F
誰知道是不是Oracle故意想搞砸JAVA?
01/12 01:35, 2F

01/12 01:49, , 3F
最近流行的不只JAVA,還有 PDF(難道連adobe reader也要卸載)
01/12 01:49, 3F

01/12 02:00, , 4F
Flash 之前不是也有漏洞?
01/12 02:00, 4F

01/12 09:30, , 5F
PDF和Flash的致命漏洞更頻繁,每隔一陣子就會爆新漏洞
01/12 09:30, 5F

01/12 09:34, , 6F
很多人電腦的Flash不是最新版,逛網站就中標,被遠端遙控.
01/12 09:34, 6F

01/12 10:19, , 7F
這些東西一直都有多少存在漏洞 只是有沒有被發現而已
01/12 10:19, 7F

01/12 13:42, , 8F
更正樓上,很多翁西都有存在漏洞..只是有沒有被公開而已
01/12 13:42, 8F

01/12 13:43, , 9F
東西
01/12 13:43, 9F

01/13 16:56, , 10F
很多系統都是以JAVA為基礎架設的...怎麼可能說移除就移除
01/13 16:56, 10F

01/14 14:18, , 11F
java 7 update 11出來了,不知道修了什麼?
01/14 14:18, 11F
文章代碼(AID): #1Gy1QULS (AntiVirus)
文章代碼(AID): #1Gy1QULS (AntiVirus)