New Java zero-day vulnerability.

ZERO-DAY SEASON IS NOT OVER YET

How to Disable Java?

New Java zero-day vulnerability has been spotted in the wild. We have seen this unpatched exploit being used in limited targeted attacks. Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable. In my lab environment, I was able to successfully exploit my test machine against latest version of FireFox with JRE version 1.7 update 6 installed.

 

Exploit

Initial exploit is hosted on a domain named ok.XXX4.net. Currently this domain is resolving to an IP address in Taiwan. Attacker web site is fully functional at the time of writing this article i.e., on August 26, 2012.

Jar

A successful exploit attempt can result in a dropper (Dropper.MsPMs) getting installed on infected systems. The dropper executable is located on the same server.

https://ok.XXX4.net/meeting/hi.exe

Dropper.MsPMs further talks to its own CnC domain hello.icon.pk which is currently resolving to an IP address 223.25.233.244 located in Singapore.

 

Callback

It's just a matter of time that a POC will be released and other bad guys will get hold of this exploit as well. It will be interesting to see when Oracle plans for a patch, until then most of the Java users are at the mercy of this exploit. Our investigation is not over yet; more details will be shared on a periodic basis.

 



Leave a comment!

Your email address will not be published. Required fields are marked *