Unpatched Java vulnerability exploited in targeted attacks, researchers say

A Java vulnerability that has yet to be patched is being actively exploited by cybercriminals

By Lucian Constantin, IDG News Service |  Security, java, Oracle

Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye.

So far, the vulnerability has been exploited in limited targeted attacks, FireEye's senior staff scientist Atif Mushtaq said Sunday in a blog post. "Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable."

The exploit is hosted on a website that resolves to an Internet Protocol address in China and its payload is a piece of malware that connects to a command and control server located in Singapore.

The malware installed in the attacks seen so far appears to be a variant of Poison Ivy, Jaime Blasco, a researcher with security firm AlienVault, said Monday in a blog post.

Poison Ivy is a so-called remote administration Trojan program that has been used in many cyberespionage campaigns in the past.

It's just a matter of time until a proof-of-concept (PoC) exploit is released and more bad guys start targeting the new Java vulnerability, Mushtaq said.

"We have confirmed the 0-day [unpatched] vulnerability to affect Java 7 update 6 build 1.7.0_06-b24 for Windows," Carsten Eiram, chief security specialist at vulnerability management firm Secunia, said Monday via email. "It should affect other versions and platforms as well."

Secunia rated the vulnerability as extremely critical because it allows the execution of arbitrary code on vulnerable systems without user interaction.

"This vulnerability is not a 'memory corruption' type vulnerability, but instead seems to be a security bypass issue that allows running untrusted code outside the sandbox without user interaction," Eiram said. "In this specific case a file is downloaded and executed on the user's system when just visiting a web page hosting a malicious applet."

A proof-of-concept exploit for the vulnerability was published online on Monday and was then used to create another exploit for use with the popular Metasploit penetration testing framework.

The Metasploit exploit was successfully tested against Java 7 update 6 using different browsers and OSes, including Mozilla Firefox running on Ubuntu Linux 10.04; Internet Explorer, Mozilla Firefox and Google Chrome on Windows XP; Internet Explorer and Firefox on Windows Vista; and IE and Firefox on Windows 7, the Metasploit Exploit team said Monday in a blog post.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness