Answer

Consider disabling Java as malware targets JRE vulnerabilities

A new piece of malware uses the same flaw as the Mac Flashback malware but can infect both Macs and PCs. Can you explain how this is possible? Does this sort of malware add fuel to the argument for disabling Java altogether?

    Requires Free Membership to View

Ask the expert!

Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)

One of the benefits touted by the Java language is "write once, run anywhere." Unfortunately, the same concept can apply just as easily to malware as to standard software. Malware typically exploits vulnerabilities in operating systems or applications. In Java's case, malware usually exploits a vulnerability in the Java Runtime Environment (JRE) and then the OS, not in the programming language. The JRE is responsible for sandboxing and enforcing security within Java. In this instance, an exploit targets JRE vulnerabilities, but the malicious code is still likely to be platform specific so that it can load additional malware or a rootkit on the system. From this point, the malware or rootkit normally takes over the system.

Disabling the Java Runtime Environment on users' desktops is a good idea if they do not need Java applications. This will limit users' ability to view specific website content, play games and other activities, but one of the core tenets of information security is that you don't install what you don't need. Applying this attitude toward enterprise security helps minimize a system's attack surface. If the JRE isn't installed, it can't be attacked. Enterprises might not be able to disable the JRE if it is required by mission-critical applications, but Java applets can still be disabled in Firefox. You can also use something like NoScript for Firefox to limit Java applets to trusted sites or limit browser use to IE when users access the JRE for mission-critical applications.

This was first published in November 2012

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: