New Java 0-day exploited in ongoing attacks
Posted on 01 March 2013.
FireEye has detected yet another Java zero-day vulnerability being exploited in attacks in the wild.

Affected updates are Java v1.6 Update 41 and Java v1.7 Update 15 (released on February 19), and the vulnerability leads to arbitrary memory read and write in the Java Virtual Machine (JVM) process.

The silver lining in all of this is that the exploit is not very reliable as it tries to overwrite a big chunk of memory. But, if it succeeds, the McRAT dropper and information stealer Trojan is downloaded onto the victim's computer.

FireEye has notified Oracle about the flaw, so you can look forward to a new update - hopefully very soon! In the meantime, the researchers are advising users to disable Java.

Still - aren't you tired of this never-ending back and forth? If you are, consider permanently disabling Java in the browser you use, then see if you miss it.

If you really need it for viewing specific websites you visit daily, use an alternative browser with enabled Java just to visit those few sites, and keep the primary one for burrowing the depths of the Internet.










Spotlight

Russian APT group actively exploiting Flash, Windows 0-day flaws

APT28 has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an "international government entity in an industry vertical that aligns with known APT28 targeting."


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Apr 21st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //