• TREND MICRO
  • ABOUT
Search:
  • Security
  • Cloud
  • Mobility
  • Social
  • Industry News
    • Cloud Computing
    • Compliance & Regulations
    • Current News
    • Cybercrime
    • Encryption
    • Mobility
    • Privacy & Policy
    • Spotlight
    • Virtualization
    • Vulnerabilities & Exploits
  • Partners
  • Trend Spotlight
Home   »   Industry News   »   How the Java Security Situation Quietly Got Much Worse

How the Java Security Situation Quietly Got Much Worse

  • By:Christopher Budd
  • on:September 10, 2013
5

Critical developments in situations sometimes happen very quietly; so quietly that not many people notice at the time they happen. We’ve recently turned a bad corner like this in the Java security situation. And there’s every reason to believe that this worsened situation is here to stay, and likely to get even worse before it gets better.

The situation around security and Java has been bad since the start of the year and we’ve all known that. Oracle has acknowledged the gravity of the situation and committed to a Microsoft-style “security push”. That’s good and the right thing to do. But as I’ve said in my commentary on Oracle’s move, the Microsoft experience teaches us that these situations get worse before they get better. And now events are proving that assessment to be accurate.

There are two recent developments that show how this situation has permanently changed for the worse. We are seeing attacks targeting unpatched vulnerabilities in Java 6, a widely-deployed but no-longer supported version of Java. And we are seeing an increase in attack sophistication with attackers carrying out lower level attacks against the Java Native Layer. Taken together these developments tell us that the threat environment for Java has increased significantly in ways that are not easy to address.

Attacks against Unsupported Java 6

The recent attacks against vulnerabilities in Java 6 are a major, new development not only for Oracle but the industry as a whole. Oracle ended support for Java 6 in February 2013. With this deadline they stopped providing security fixes for Java 6. While a vendor ending support and no longer providing security fixes isn’t a new thing, the fact that more than 50% of users out there are still running Java 6 makes this an unprecedented situation. Even the retirement of previous versions of Microsoft Windows hasn’t seen support go away with 50% of users still on the unsupported version. This is a large pool of vulnerable users who will never be protected with security fixes and so viable targets for attack.

And now we are seeing the first instance of active attacks against this large pool of vulnerable targets. With the JAVA_EXPLOIT.ABC attack targeting CVE-2013-2463 we have a patched Java 7 vulnerability that’s unpatched on Java 6 and being attacked. While the attacks aren’t widespread yet, it has been incorporated into the Neutrino Exploit Kit which points to a high likelihood of increasing attacks against this vulnerability.

But this won’t be the last time we’ll face this situation. This is the first in what is sure to be an ongoing series of attacks against unpatched Java 6 vulnerabilities. As long as a sizeable pool of people stay on this unsupported version of Java attacks will be viable. And so attacks will be carried out.

Attacks against Java Native Layer

The other development, an increase in attacks against the Java Native Layer, makes this bad situation even worse. Increased attacks against the Java Native Layer indicate that attackers are getting more sophisticated in their ability to attack Java. Historically too, lower layer attacks tend to be harder to protect against and more serious in their impact on the target system.

Since we know Java 6 won’t be getting fixes for its vulnerabilities now the only means to protect Java 6 against attacks is to protect against the attacks themselves. But with the attacks getting more sophisticated that means protections against the attacks need to increase in sophistication as well. We can and will meet that challenge: but it only serves to make the Java 6 situation more difficult. And it indicates that Java 7, even though supported, is likely in for a rough time as well.

The increasing sophistication these attacks show tell us that attackers are becoming very familiar and comfortable with Java as a platform to attack. We saw this happen with Microsoft Windows and there we saw that meant the attackers were there for the long haul, using their increasing sophistication to match and undermine the security improvements the vendor made. Oracle’s security push will push the unsophisticated attackers off their platform, but the sophisticated attackers would seem to be settling in for the long haul.

Lessons for Today

The lessons for all of us of these developments are very clear. First, everyone should make a priority of being on the latest, supported version of Java. Second, those who have to run old unsupported versions for whatever reason should be sure to have good active protections against attacks. Third, Java (like all software on the Internet) should be used only an as needed basis: if you don’t need it, disable it.

But not everyone is going to be able to follow all or even any of those recommendations. Java is used on devices and in embedded systems in ways that mean we all have Java running in places we don’t know about and on systems we can’t update. This means we have to look to protect not just the devices but the network itself. Ironically, it gives a new, darker meaning to Sun Microsystems’ (the creator of Java) old marketing slogan “The Network is the computer.”

The last lessons from the Java 6 situation are for the industry as a whole as we prepare for May 2014, the first month Microsoft will not provide security fixes for Windows XP. We can learn from how we deal with Java 6 ways to help deal with Windows XP’s retirement next year.

Of course, there is real concern that Java 6 and Windows XP together can help create a perfect storm of permanently vulnerable systems. It could be that next summer will be a bad one for us but a great one for cybercriminals if together these unsupported platforms provide a large pool of potential victims. It could be not just the Java situation that’s gotten worse, but the overall threat environment. We’ve taken our first steps into uncharted territory: it’s hard to know for sure how this will end.

  • Johnnie

    Why backport fixes to Java 6 if Oracle offers Java 7?

    • Misha Nasledov

      Because not everyone’s software is ready to build much less tested on production environments with Java 7. Who knows what could happen? Could be OK, could be a disaster depending on the software.

  • Johnny Nilsson

    I read the article with some care and got a bit scared at first. But then, in the end of the article they write “Java (like all software on the Internet) should be used only an as needed basis (…)”. This article must be dealing with the Java applet-technology and not the server-side java.
    Sneaky way to hide it like this and more or less just talk about java in general, even though it is all about the security risks, that are well known, in the java applet technology.

  • Paul Valente

    Yes, it is important to note this vulnerability is about having Java enabled in the browser and the recommendations in that regard are accurate. The talk about the vulnerability of various embedded systems is likely valid in some cases, but I think is rather rhetorical in this instance. This vulnerability is certainly not server-side Java.

  • Yazad Khambata

    Hi Christopher,

    I know it has been a few months since you posted this blog but alas your recommendations and observation continue to be relevant and true since I believe many users as you rightly pointed out do not know and care about updating software and in many cases just cannot due to applications that they use that have compatibility issues.

    I had written a paper on the subject, do consider having a look – I have posted this on my blog – http://yazadk.wordpress.com/2014/02/24/java-and-information-assurance/.

    Also if you could share more on Java native and low level attacks on your blog or comment that would be of interest (at least for me :) and I am sure to very many others).

    Thank you, and I hope things change for the better for client side VMs and technologies.

    Cheers,

Security Intelligence Blog

  • 64-bit Version of HAVEX Spotted
  • Repackaging HTML5 Apps into Android Malware
  • Facebook Users Targeted By Android Same Origin Policy Exploit

Industry News

  • The reality of the Sony Pictures breach
  • Thousands of WordPress sites with malware highlight need for comprehensive security
  • Tor may have driven up bank fraud over the past 14 years

Trend Micro Blogs

  • CTO Insights
  • CounterMeasures
  • Internet Safety for Kids
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2014 Trend Micro Incorporated. All rights reserved.
X
Read our comprehensive coverage of the Sony Pictures hack.
Read It Now