In said:
I have heard so much BS about the danger of Java. Crying wolf on that
scale should be a criminal offence, or at least get you sued.
On the other hand raising doubt about a acknowledged and severe security
vunerability isn't very wise either.
Without pointing you to the source code of the exploit, which is widely
available this time, when reading the code it becomes trivially clear to
anyone that it allows the attacker to execute _any_ code on the target
machine. It evades the normal java sandbox completely.
So lets not play this one down. This time it is for real.
On the other paw, this update follows fast on the heels of the
previous one. That would only normally happen if there were a very
important security fix.
Indeed.
But they are unusually vague about what the security vulnerability is,
ostensibly to avoid giving hints to exploiters. It sounds like it
applies only to unsigned applets on malicious websites. It is probably
1000 times easier for a malicious website to use JavaScript than this
exploit.
Unfortunately I think Oracle are normally vague. If anything, they are less
vague than usual in describing the severity and consequences. I quote:
"To be successfully exploited, an unsuspecting user running an affected
release in a browser will need to visit a malicious web page that
leverages this vulnerability. Successful exploits can impact the
availability, integrity, and confidentiality of the user's system."
All you have to do is load the wrong web page in your browser. That's it.
That an attacking applet has to be unsigned doesn't limit the severety of
this vunerability. If the vunerability was only exploitable by signed
applets, the risk would be somewhat more limited. As it stands right now,
any script kiddie can compile and publish exploiting code.
Further this Java vunerability in it self wouldn't become any less serious
if any javascript engine would have a similar vunerability. Two wrongs does
not make a right.