Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye.
So far, the vulnerability has been exploited in limited targeted attacks, FireEye's senior staff scientist Atif Mushtaq said Sunday in a blog post. "Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable."
[ Security expert Roger A. Grimes offers a guided tour of the latest threats and explains what you can do to stop them in InfoWorld's "Fight Today's Malware" Shop Talk video and Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter, both from InfoWorld. ]
The exploit is hosted on a website that resolves to an Internet Protocol address in China and its payload is a piece of malware that connects to a command and control server located in Singapore.
The malware installed in the attacks seen so far appears to be a variant of Poison Ivy, Jaime Blasco, a researcher with security firm AlienVault, said Monday in a blog post.
Poison Ivy is a so-called remote administration Trojan program that has been used in many cyberespionage campaigns in the past.
It's just a matter of time until a PoC (proof-of-concept) exploit is released and more bad guys start targeting the new Java vulnerability, Mushtaq said.
"We have confirmed the 0-day [unpatched] vulnerability to affect Java 7 update 6 build 1.7.0_06-b24 for Windows," Carsten Eiram, chief security specialist at vulnerability management firm Secunia, said Monday via email. "It should affect other versions and platforms as well."
Secunia rated the vulnerability as extremely critical because it allows the execution of arbitrary code on vulnerable systems without user interaction.
"This vulnerability is not a 'memory corruption' type vulnerability, but instead seems to be a security bypass issue that allows running untrusted code outside the sandbox without user interaction," Eiram said. "In this specific case a file is downloaded and executed on the user's system when just visiting a web page hosting a malicious applet."
A proof-of-concept exploit for the vulnerability was published online on Monday and was then used to create another exploit for use with the popular Metasploit penetration testing framework.
The Metasploit exploit was successfully tested against Java 7 update 6 using different browsers and OSes, including Mozilla Firefox running on Ubuntu Linux 10.04; Internet Explorer, Mozilla Firefox and Google Chrome on Windows XP; Internet Explorer and Firefox on Windows Vista; and IE and Firefox on Windows 7, the Metasploit Exploit team said Monday in a blog post.
A Metasploit user also reported testing the exploit successfully on Mac OS X 10.7.4 with Safari version 6.0 and Java 7 update 6.