Qualys Blog

www.qualys.com
wkandek

Java 6 0-Day Exploit in the Wild – Updated

Update: Oracle has patched the CVE-2013-2463 vulnerability in Java 6 update 51, but this version is only available to subscribers of the commercial version of Java with the paid for Premier Support contract. If you depend on Java 6 in your organization you should investigate this support option.

Original: CVE-2013-2463 is a vulnerability in the Java 2D subcomponent, that was addressed by Oracle in the June 2013 Critical Patch Update for Java 7. Java 6 (including the latest u45) has the same vulnerability, as Oracle acknowledges in the CPU, but since Java 6 has become unsupported as of its End-of-Life in April 2013, there is no patch for the vulnerability.

cve-2013-2463

It is, in essence, an implicit 0-day vulnerability: we know about its existence, but do not have a patch at hand. This happens each time a software package loses support and we track these instances in QualysGuard with our "EOL/Obsolete" detections, in this case:

     QID: 105490 EOL/Obsolete Software: Oracle Java SE/JRE/JDK 6/1.6 Detected

But this time, things have become a bit more serious. As Matthew Schwartz reports in Informationweek, F-Secure has seen exploits for this vulnerability in Java 6 in the wild. Further they have seen it included in the Neutrino exploit kit, which guarantees that it will find widespread adoption. In addition, we still see very high rates of Java 6 installed (a bit over 50%), which means many organizations are vulnerable. We attribute this to the lock-in that organizations experience when they run software applications that require the use of Java 6.

Without doubt, organizations should update to Java 7 where possible, meaning that IT administrators need to verify with their vendors if an upgrade path exists. However I have talked to organizations that have pointed out that they cannot update or disable Java because it would affect business critical applications. So in essence they accept the risk of outdated Java in order to be able to continue to do business. Some of the organizations have moved to contain the use of Java (for example at Etsy), but that seems to be a rather rare effort.

For users of Java 6, it might be useful to look into the whitelisting of Java applets. Internet Explorer supports this out of the box through its concept of "Zones" and while it is not a perfect solution, it should deal with the most common attack vector – an applet embedded in a webpage. See our previous post on Java for some information on how to approach this.

We will keep you informed of any updates around the issue here on this blog.

3 responses to “Java 6 0-Day Exploit in the Wild – Updated”

  1. Oracle no longer provides public updates to Oracle Java SE 6. These updates, which may include security patches, are now only available to users of Oracle Java SE 6 who have a commercial support agreement with Oracle. However, OpenJDK 6 remains supported and actively patched for security flaws. An OpenJDK 6 patch for CVE-2013-2463 is available:

    http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-July/023941.html

    Java 6 security flaws reported directly to Oracle may only be resolved in their commercial patch stream, with no fix available to users of OpenJDK or other Java 6 implementations. Security issues that affect Java 6 can be reported to the Red Hat Security Response Team:

    http://securityblog.redhat.com/2013/07/03/reporting-security-flaws-for-openjdk-6/

      • Unfortunately not really. OpenJDK 6 builds on Windows just fine, but there doesn’t seem to be anyone producing updated Windows binaries with each security fix. The only binaries available are quite out of date, and vulnerable to CVE-2013-2463. That said, it would not be that much effort for someone to start producing regularly updated OpenJDK 6 Windows binaries, and given the issues you’ve outlined in the post, I think there would be a lot of uptake by users.

Leave a Reply