Wow. Java and Oracle really getting beat up lately. Java seems to be following the downward spiral of Adobe Flash (in terms of viability in being used for web apps/websites). First, Apple sticks a fork in them, and now the government. Homeland Security has recommended that users disable Java in their web browsers. Ouch. That hurts.
The full story at NBC News. I’ve copied and pasted it below in case the link dies.
=======================================================
US warns on Java software as security concerns escalate
By Jim Finkle
The U.S. Department of Homeland Security urged computer users to disable Oracle Corp’s Java software, amplifying security experts’ prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web.
Hackers have figured out how to exploit Java to install malicious software enabling them to commit crimes ranging from identity theft to making an infected computer part of an ad-hoc network of computers that can be used to attack websites.
“We are currently unaware of a practical solution to this problem,” the Department of Homeland Security’s Computer Emergency Readiness Team said in a posting on its website late on Thursday.
“This and previous Java vulnerabilities have been widely targeted by attackers, and new Java vulnerabilities are likely to be discovered,” the agency said. “To defend against this and future Java vulnerabilities, disable Java in Web browsers.”
CERT’s instructions on how to do so can be found here, under “Solution.”
Oracle declined on Friday to comment on the warning.
Paul Wagenseil, senior editor for security at TechNewsDaily, writes that “it’s easier than ever before to disable Java in browsers. The latest version of the Java Control Panel for Windows has a checkbox under the Security tab labeled ‘Enable Java content in the browser.’ Uncheck that and all your browsers should be Java-free.”
If you are running an earlier version of Java 7 for Windows, “you’ll have to disable each browser individually.”
To make sure Java is really disabled, Wagenseil writes, users can visit this site to check.
“For versions of Java older than Java 7 (which you shouldn’t be running anyway), the de-Javafication process for Internet Explorer involves editing the Windows Registry,” he notes. “If you don’t know what that is, don’t do it. Instead, stop using Internet Explorer entirely.”
Wagenseil says that “Unless you use Java professionally — such as by developing Web or Android apps, updating a Website or using Adobe’s Creative Suite software package — you don’t really need it.”
What is Java?
Java is a computer language that enables programmers to write software utilizing just one set of code that will run on virtually any type of computer, including ones that use Microsoft’s Windows, Apple’s OS X and Linux, an operating system widely employed by corporations.
Computer users access Java programs through modules, or plug-ins, that run Java software on top of browsers such as Internet Explorer and Firefox.
The U.S. government’s warning on Java came after security experts warned on Thursday of the newly discovered flaw.
It is relatively rare for government agencies to advise computer users to completely disable software due to a security bug, particularly in the case of widely used programs such as Java. They typically recommend taking steps to mitigate the risk of attack while manufacturers prepare an update, or hold off on publicizing the problem until an update is prepared.
In September, the German government advised the public to temporarily stop using Microsoft’s Internet Explorer browser to give it time to patch a security vulnerability that opened it to attacks.
Prime target for hackers
Java is so widely used that the software has become a prime target for hackers. Last year Oracle’s Java surpassed Adobe’s Reader software as the most frequently attacked piece of software, according to security software maker Kaspersky Lab.
Java was responsible for 50 percent of all cyber attacks last year in which hackers broke into computers by exploiting software bugs, according Kaspersky. That was followed by Adobe Reader, which was involved in 28 percent of all incidents. Microsoft Windows and Internet Explorer were involved in about 3 percent of incidents, according to the survey.
The Department of Homeland Security said attackers could trick targets into visiting malicious websites that would infect their PCs with software capable of exploiting the bug in Java.
It said an attacker could also infect a legitimate website by uploading malicious software that would infect machines of computer users who trust that site because they have previously visited it without experiencing any problems.
They said developers of several popular tools, known as exploit kits, which criminal hackers use to attack PCs, have added software that allows hackers to exploit the newly discovered bug in Java to attack computers.
Similar scare last August
Security experts have been scrutinizing the safety of Java since a similar security scare in August, which prompted some of them to advise using the software only on an as-needed basis.
At the time they advised businesses to allow their workers to use Java browser plug-ins only when prompted for permission by trusted programs such as GoToMeeting, a Web-based collaboration tool from Citrix Systems.
Java suffered another setback in October when Apple began removing old versions of the software from Internet browsers of Mac computers when its customers installed new versions of its OS X operating system. Apple did not provide a reason for the change and both companies declined to comment at the time.
Adam Gowdiak, a researcher with Polish security firm Security Explorations, told Reuters he believes that Oracle fails to properly test its software fixes for security flaws. “It’s definitely safer for users to stay away from Java ’til Oracle starts taking security seriously,” he said.
(Editing by Dan Grebler)
(c) Copyright Thomson Reuters 2013.
That’s all very well, but I just disabled Java and now quite a few blogs I read won’t load. So I re-enabled it.
Oracle plans on releasing an update on Tuesday that will patch all of the known vulnerabilities – supposedly there are 86 holes to patch.
Thanks – I’ll look out for that.
Yesterday, Wednesday, Jan 16, 2013, the (that’s a mouth full) Department of Homeland Security’s United States Computer Emergency Readiness TeamUS-CERT, announced on their website that Oracle has released its update. News outlets are saying that CERT is still saying to disable it, but I see no current mention of this. CERT merely says to follow best-practices and determine which updates should be applied. After a bit of testing, they will probably come forth with a recommendation.
The Oracle Critical Patch Update Advisory – January 2013 is here.