If you haven’t been following the news, I’d like to make you aware of a security situation affecting [B]billions [/B]of web browser users around the world, and undoubtedly members of our community. The security concern revolves around a little piece of software called [B]Java[/B], offered for free by a company called Oracle, which is used by your web browser (computer and mobile) for various things. Some say this is concern is overblown. The fact the U.S. Department of Homeland Security has issued a warning deserves at least being informed.
Download your security fix here or read on for instructions on how to disable/remove the software.
From krebsonsecurity.com (it’s a rather long post, but very informative, so get ready for some reading!):
[B]Q: What is Java, anyway?[/B]
A: Java is a programming language and computing platform that powers programs including utilities, games, and business applications. According to Java maker[B]Oracle Corp.[/B], Java runs on more than 850 million personal computers worldwide, and on billions of devices worldwide, including mobile and TV devices. It is required by some Web sites that use it to run interactive games and applications.
[B]Q: So what is all the fuss about? [/B]
A: Researchers have discovered that cybercrooks are attacking a previously unknown security hole in [B]Java 7[/B] that can be used to seize control over a computer if a user visits a compromised or malicious Web site.
Q: Yikes. How do I protect my computer?[/B]
A: The version of Java that runs on most consumer PCs includes a browser plug-in. According to researchers at [B]Carnegie Mellon University[/B]‘s [B]CERT[/B], unplugging the Java plugin from the browser essentially prevents exploitation of the vulnerability. Not long ago, disconnecting Java from the browser was not straightforward, but with the release of the latest version of[B]Java 7 — Update 10[/B] — Oracle included a very simple method for removing Java from the browser. You can find their instructions for doing this here.
Q: How do I know if I have Java installed, and if so, which version?[/B]
A: The simplest way is to visit this link and click the “Do I have Java” link, just below the big red “Download Java” button.
Q: I’m using Java 6. Does that mean I don’t have to worry about this? [/B]
A: There have been conflicting findings on this front. The description of this bug at the National Vulnerability Database (NVD), for example, states that the vulnerability is present in Java versions going back several years, including version 4 and 5. Analysts at vulnerability research firm Immunity say the bug could impact Java 6 and possibly earlier versions. But [B]Will Dormann[/B], a security expert who’s been examining this flaw closely for CERT, said the NVD’s advisory is incorrect: CERT maintains that [I]this vulnerability stems from a component that Oracle introduced with Java 7[/I]. Dormann points to a detailed technical analysis of the Java flaw by [B]Adam Gowdiak[/B] of Security Explorations, a security research team that has alerted Java maker Oracle about a large number of flaws in Java. Gowdiak says Oracle tried to fix this particular flaw in a previous update but failed to address it completely.Either way, it’s important not to get too hung up on which versions are affected, as this could become a moving target. Also, a new zero-day flaw is discovered in Java several times a year. That’s why I’ve urged readers to either uninstall Java completely or unplug it from the browser no matter what version you’re using.
Q: A site I use often requires the Java plugin to be enabled. What should I do?[/B]
A: You could downgrade to Java 6, but that is not a very good solution. Oracle will stop supporting Java 6 at the end of February 2013, and will soon be transitioning Java 6 users to Java 7 anyway. If you need Java for specific Web sites, a better solution is to adopt a two-browser approach. If you normally browse the Web with Firefox, for example, consider disabling the Java plugin in Firefox, and then using an alternative browser (Chrome, IE9, Safari, etc.) with Java enabled to browse only the site(s) that require(s) it.
Q: I am using a Mac, so I should be okay, right?[/B]
A: Not exactly. Experts have found that this flaw in Java 7 can be exploited to foist malware on [B]Mac [/B]and [B]Linux[/B] systems, in addition to Microsoft Windows machines. Java is made to run programs across multiple platforms, which makes it especially dangerous when new flaws in it are discovered. For instance, the Flashback worm that infected more than 600,000 Macs wiggled into OS X systems via a Java flaw. Oracle’s instructions include advice on how to unplug Java from Safari. I should note that Apple has not provided a version of Java for OS X beyond 6, but users can still download and install Java 7 on Mac systems. However, it appears that in response to this threat, Apple has taken steps to block Java from running on OS X systems.
Q: I don’t browse random sites or visit dodgy porn sites, so I shouldn’t have to worry about this, correct?[/B]
A: Wrong. This vulnerability is mainly being exploited by exploit packs, which are crimeware tools made to be stitched into Web sites so that when visitors come to the site with vulnerable/outdated browser plugins (like this Java bug), the site can silently install malware on the visitor’s PC. Exploit packs can be just as easily stitched into porn sites as they can be inserted into legitimate, hacked Web sites. All it takes is for the attackers to be able to insert one line of code into a compromised Web site.
Q: I’ve read in several places that this is the first time that the U.S. government has urged computer users to remove or wholesale avoid using a particular piece of software because of a widespread threat. Is this true?[/B]
A: Not really. During previous high-alert situations, CERT has advised Windows users to avoid using Internet Explorer. In this case, CERT is not really recommending that users uninstall Java: just that users unplug Java from their Web browser.
Q: I’m pretty sure that my Windows PC has Java installed, but I can’t seem to locate the Java Control Panel from the Windows Start Menu or Windows Control Panel. What gives?[/B]
A: According to CERT’s Dormann, due to what appears to potentially be a bug in the Java installer, the Java Control Panel applet may be missing on some Windows systems. In such cases, the Java Control Panel applet may be launched by finding and executing javacpl.exe manually. This file is likely to be found in C:\Program Files\Java\jre7\bin or C:\Program Files (x86)\Java\jre7\bin.
Q: I can’t remember the last time I used Java, and it doesn’t look like I even need this program anymore. Should I keep it?[/B]
A: Java is not as widely used as it once was, and most users probably can get by without having the program installed at all. I have long recommended that users remove Java unless they have a specific use for it. If you discover later that you really do need Java, it is trivial and free to reinstall it.
[B]Download your security fix here.[/B]
Thanks for reading!