[新聞] Java又有新漏洞,美國土安全部建議停用Jav
繼上次1.7.0_06爆發安全漏洞之後,這次1.7.0_10又爆發新的漏洞(含之前版本)。
這次新漏洞嚴重到只要逛到惡意網頁,電腦就會被壞人接管。
這次漏洞是跨平台的,包括Windows, Linux和Mac OSX等全部都完蛋。
由於事態嚴重,美國土安全部 暴氣了,直接叫大家移除停用JAVA。
Java漏洞恐遭駭 專家籲解除安裝
路透社 – 2013年1月11日
http://tinyurl.com/bcexrxj
(路透紐約10電)受廣泛使用的甲骨文公司(Oracle Corp)Java軟體
被發現有1個安全漏洞,且駭客正以此攻擊電腦,安全專家建議,電腦用
戶應停用Java。
全球有數億台電腦安裝Java軟體,它是種電腦語言,可以讓程式開發人
員用1種程式碼編寫軟體,且幾乎與每種電腦都可相容。
3名電腦安全專家今天告訴路透社,電腦用戶應該解除安裝Java,以避
免受到攻擊。
安全公司 AlienVault Labs實驗室經理布拉斯科(Jaime Blasco)說:
「Java一團糟,並不安全。」「你必須解除安裝。」
網路安全供應商Rapid7的首席安全主管摩爾(HDMoore)表示,採用Mac
OS X、Linux、Windows等系統的電腦似乎都無法對攻擊免疫。
甲骨文發言人表示無法立即就此事置評。
美國官方發佈警告,趕快停用Java
Oracle Java 7 Security Manager Bypass Vulnerability
http://www.us-cert.gov/cas/techalerts/TA13-010A.html
Systems Affected
Any system using Oracle Java 7 (1.7, 1.7.0) including
Java Platform Standard Edition 7 (Java SE 7)
Java SE Development Kit (JDK 7)
Java SE Runtime Environment (JRE 7)
All versions of Java 7 through update 10 are affected. Web browsers
using the Java 7 plug-in are at high risk.
Overview
A vulnerability in the way Java 7 restricts the permissions of Java
applets could allow an attacker to execute arbitrary commands on a
vulnerable system.
Description
A vulnerability in the Java Security Manager allows a Java applet to
grant itself permission to execute arbitrary code. An attacker could
use social engineering techniques to entice a user to visit a link to
a website hosting a malicious Java applet. An attacker could also
compromise a legitimate web site and upload a malicious Java applet
(a "drive-by download" attack).
Any web browser using the Java 7 plug-in is affected. The Java Deployment
Toolkit plug-in and Java Web Start can also be used as attack vectors.
Reports indicate this vulnerability is being actively exploited, and
exploit code is publicly available.
Further technical details are available in Vulnerability Note VU#625617.
Impact
By convincing a user to load a malicious Java applet or Java Network
Launching Protocol (JNLP) file, an attacker could execute arbitrary code
on a vulnerable system with the privileges of the Java plug-in process.
Solution
Disable Java in web browsers
This and previous Java vulnerabilities have been widely targeted by
attackers, and new Java vulnerabilities are likely to be discovered.
To defend against this and future Java vulnerabilities, disable Java in
web browsers.
Starting with Java 7 Update 10, it is possible to disable Java content
in web browsers through the Java control panel applet. From Setting the
Security Level of the Java Client:
For installations where the highest level of security is required,
it is possible to entirely prevent any Java apps (signed or unsigned)
from running in a browser by de-selecting Enable Java content in the
browser in the Java Control Panel under the Security tab.
If you are unable to update to Java 7 Update 10 please see the solution
section of Vulnerability Note VU#636312 for instructions on how to
disable Java on a per browser basis.
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 218.211.154.48
推
01/11 23:56, , 1F
01/11 23:56, 1F
→
01/12 01:35, , 2F
01/12 01:35, 2F
推
01/12 01:49, , 3F
01/12 01:49, 3F
→
01/12 02:00, , 4F
01/12 02:00, 4F
→
01/12 09:30, , 5F
01/12 09:30, 5F
→
01/12 09:34, , 6F
01/12 09:34, 6F
→
01/12 10:19, , 7F
01/12 10:19, 7F
推
01/12 13:42, , 8F
01/12 13:42, 8F
→
01/12 13:43, , 9F
01/12 13:43, 9F
推
01/13 16:56, , 10F
01/13 16:56, 10F
→
01/14 14:18, , 11F
01/14 14:18, 11F
AntiVirus 近期熱門文章
PTT數位生活區 即時熱門文章