Zero Day Java Vulnerability Allows McRat Trojan Infections

  /     /     /  
Publicated : 22/11/2024   Category : security


Zero Day Java Vulnerability Allows McRat Trojan Infections


Security experts urge users of latest versions of Java 6 and 7 to disable Java in their browsers until Oracle releases a patch.



Anonymous: 10 Things We Have Learned In 2013 (click image for larger view and for slideshow)
A newly discovered zero-day vulnerability in the most recent versions of Java 6 and Java 7 is being actively exploited by attackers to install malicious software on vulnerable PCs.
We detected a brand
new Java zero-day vulnerability
that was used to attack multiple customers, FireEye security researchers Darien Kindlund and Yichong Lin said in a blog posted Thursday. Specifically, we observed successful exploitation against browsers that have Java v1.6 update 41 and Java v1.7 update 15 installed, they said, referring to the two most recently released versions of Java 6 and Java 7.
The discovery of the new bug (CVE-2013-1493) makes for the third Java zero-day vulnerability to have been reported to Oracle this week.
So far, the FireEye researchers have publicly detailed the new vulnerability only in broad terms: Not like other popular Java vulnerabilities in which [the] security manager can be disabled easily, this vulnerability leads to [an] arbitrary memory read and write in [the] JVM [Java virtual machine] process, they said.
[ Does your business depend on Java? Heres how to stay secure.
10 Facts: Secure Java For Business Use
. ]
In the attack they spotted, a malicious JAR (Java archive) file is used to exploit the vulnerability and then target memory used by the Java security manager. If the exploit finds that the security manager is active, it attempts to overwrite the memory used by the security manager, thus disabling the functionality.
Upon successful exploitation, it will download a McRAT executable ... from same server hosting the JAR file and then execute it, said Kindlund and Lin.
McRAT
is a
remote access Trojan
(RAT) designed to download further malware onto an infected PC.
Independent security researcher
Eric Romang
noted Friday in a blog post that the new yet another Oracle Java 0day was only being detected
by 21 out of 46 antivirus scanners
tested via VirusTotal, leading him to suggest that the exploit might already be built into an
automated crimeware toolkit
.
Oracle last released an
emergency update for Java
just 10 days ago, including what was billed as the final-ever public release of an update for Java 6, which has now been officially retired. That emergency update fixed a vulnerability that was being exploited by attackers to
bypass the Java sandbox
. It followed another emergency update from Oracle, released at the beginning of February, that
patched 50 bugs
in Java.
News of the new vulnerability brought fresh calls from security experts to
disable the Java browser plug-in
-- note that JavaScript is not at risk -- if at all possible. Take care or uninstall Java (or both), according to a
tweet
from French security firm
Vupen Security
.
The FireEye researchers offered similar advice: We urge users to disable Java in your browser until a patch has been released; alternatively, set your Java security settings to High and do not execute any unknown Java applets outside of your organization, they said.
Meanwhile, veteran Java bug hunter Adam Gowdiak, CEO and founder of Poland-based Security Explorations, Thursday sent an email update to the Bugtraq mailing list, reporting on the status of the two
Java vulnerabilities he discovered this week
-- mentioned above -- which hes detailed to Oracle, including proof-of-concept exploit code.
Of the two bugs, Oracle confirmed what Gowdiak labeled issue 55. No details of the vulnerabilities have been publicly released, except that they involve a
Java reflection vulnerability
. But according to Gowdiaks email, Oracle dismissed issue 54, saying that merely provides allowed behavior in Java.
Gowdiak, however, disagreed with Oracles assessment, saying that a similar, previously discovered problem leads to access denied condition and a security exception, which he considers to be a security flaw. If Oracle sticks to their assessment well have no choice than to publish details of issue 54, he said.
Attend Interop Las Vegas, May 6-10, and attend the most thorough training on Apple Deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR03 by March 9 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology. Register for
Interop
today!

Last News

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security

▸ Homeland Security Background Checks Breach Raises Concerns. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Zero Day Java Vulnerability Allows McRat Trojan Infections