Major Flaw Exposes Windows Users to Java Vulnerability
Less than two weeks after Microsoft patched a significant zero-day flaw in its Internet Explorer web browser, it's come to light that a Java vulnerability in the software company's Windows operating system (OS) could compromise PCs if they visit a particular web page infected with malicious code.
Thus far, two researchers working for different security companies have reported on the matter. Late last week, Tavis Ormandy, an engineer for Google, covered the issue in the Full Discloser email list while Ruben Satamarta, an engineer at Wintercore, discussed the issue on his company's web site.
Disabling Java Plug-In Does Not Prevent Attack
The vulnerability is associated with the Java Web State frame, which is designed to allow developers to easily and efficiently create Java programs. It's a troubling vulnerability because disabling the Java plug-in doesn't appear to be helping prevent the launching of an attack.
"The toolkit provides only minimal validation of the URL (web address) parameter, allowing us to pass arbitrary parameters to the ... [Java Web Start] utility, which provides enough functionality via command line arguments to allow this error to be exploited," Ormandy noted.
"The simplicity with which this error can be discovered has convinced me that releasing this document is in the best interest of everyone except the vendor." (Source: cnet.com)
Every Windows, Most Browsers Targeted
According to security firm Kapersky Lab, the issue is targeting every version of the Windows OS and big-name browsers, such as Mozilla Firefox, Internet Explorer, and Google Chrome.
The company responsible for patching Java-related problems, Sun Microsystems, was reportedly informed of the vulnerability some time ago. According to Ormandy, however, Sun didn't consider the flaw critical enough to create and distribute an emergency patch.
Sun has yet to comment on the problem.
It's expected that could change soon as more reports on the flaw emerge. According to one rumor, it's even possible the vulnerability could be used to download and run a Trojan horse via FTP (file transfer protocol). (Source: h-online.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.