As attacks on the new Java zero-day vulnerability continue and researchers look for ways to mitigate the flaw, they are encouraging users to disable Java in their browsers. There is now a site that users can visit that will detect whether their browser is running a vulnerable version of Java.
Security vendor Rapid 7 has set up a site that will detect the version of Java that is running in the user’s browser and tell her whether it contains the newly discovered Java vulnerability. The flaw is in Java 7 and researchers have found ongoing attacks in the wild targeting the vulnerability. The attacks are in the form of drive-by downloads right now, with successful exploitation leading to the installation of the Poison Ivy remote-access tool on compromised machines. Poison Ivy is a well-known RAT and has been used in a number of attacks in recent years.
Java has become a major target for attackers in the last few years, as it offers a number of things that appeal to them: wide deployment, a long update cycle and lots of readily available bugs. Java vulnerabilities often are included in exploit packs and tend to be used in the kind of drive-by download attacks that often ensnare unsuspecting users.
Oracle has not released any statements on the new Java flaw, but the next scheduled patch release is not until mid-October. Oracle does not release emergency patches often, so the best course of action right now is to disable Java in any browser that you use regularly.
To disable Java in Google Chrome:
To disable Java in Mozilla Firefox:
Disabling Java in Internet Explorer is a little more complex, for some reason. Brian Krebs has a description of a couple of different methods for removing Java from IE.