However, this does not bring much security! An attacker can still automatically downgrade your version of Java (using installJRE) and exploit this bug or any other he likes!
Almost one year ago, I blogged about one of my favorite security bug, found by Sami Koivu.
More specifically, I blogged about a class of Java bugs exposed by Sami Koivu and I mentioned this was the first instance of it.
Not only was it interesting from a technical perspective, but also high impact, allowing perfectly reliable (and relatively simple) cross platform exploitation of any system supporting Java applets (and that's a lot of systems). And this, through a widely deployed, but notoriously poorly updated component.
One year later , Sami strikes again. This time should be the final nail in Java applets' coffin for anyone with security expectations:
- Another instance of the privileged deserialization class of bugs (CVE-2010-0094)
- A new class of bugs: Java trusted method chaining. With one instance as a free sample (CVE-2010-0840). (This one is beautful by the way, be sure to read!)
- Free goodies for web security researchers: a flaw that completely breaks the web security model. The "Java-SOP" security was done in the compiler, not the runtime (CVE-2010-0095). Normally this would translate to "really bad", but why would one need your cookies when one can have your computer?
But Tavis would not let Sami have his party alone and between two kernel bugs took a quick look at the Java deployment toolkit and found this embarrassingly trivially exploitable issue. It's not corrected yet. And it's exploitable even if you have Java disabled in IE or Firefox, you only need to have Java installed.
It's so simple that it was obvious that many people had found (and were exploiting) this one. And we've already had confirmation of this, which led Tavis to release his advisory with mitigation instructions before a patch was available. Read his advisory for interesting thoughts on disclosure.
So, dear reader, if you don't want to get owned multiple times:
- Disable Java in your web browsers
- Uninstall Java completely or follow Tavis' mitigation instructions on Windows
And anyway, a lazy attacker can just silently downgrade his up-to date target to whatever vulnerable Java version he wants to exploit, using the aforementioned Java deployment toolkit. Really, it's a feature.
Moreover, not everyone can update Java. Let's see how long it takes for Apple to patch these ones this time. My bet is that up-to-date default MacOS X installations are going to be vulnerable for a while to even the publicly reported bugs.
This is Javocalypse.
 well technically, only a few months later, but it took 5 months before the public advisory. A delay that I would call "reasonable".