New bug/exploit for javaws, (Sat, Apr 10th)
It looks like Tavis Ormandy posted an interesting bug in javaws application to Full Disclosure yesterday. Ihave yet to verify all the details, but if what Tavis posted is true it opens up a rather interesting scenario for an attacker. (one which Tavis in his PoC code outlines rather well!) We will try and update this post as more information is discovered. Ihave been talking to a few other security researchers who have verified his claims, i have yet to successfully verify his PoC on any of my vms. (might be version issues)
Tavis's post (full information here)
Tavis also did an excellent job in not only formatting of his alert, but also in the content(again, i have yet to verify all this my self!). The below is a snippet of the mitigation portion of his alert.
If you believe your users may be affected, you should consider applying one of
the workarounds described below as a matter of urgency.
- Internet Explorer users can be protected by temporarily setting the killbit
on CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA. To the best of my knowledge, the
deployment toolkit is not in widespread usage and is unlikely to impact end
- Mozilla Firefox and other NPAPI based browser users can be protected using
File System ACLs to prevent access to npdeploytk.dll. These ACLs can also be
managed via GPO.
Detailed documentation on killbits is provided by Microsoft here
Domain administrators can deploy killbits and File System ACLs using GPOs, for
more information on Group Policy, see Microsoft's Group Policy site, here
You may be tempted to kill the HKLM...JNLPFileShellOpenCommand key, but
the author does not believe this is sufficient, as the plugin also provides
enough functionality to install and downgrade JRE installations without
prompting (seriously). However, if none of your affected users are local
Administrators, this solution may work (untested).
As always, if you do not require this feature, consider permanently disabling
it in order to reduce attack surface.
(c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.