SlideShare a Scribd company logo
Sponsored by
Java Insecurity: How to Deal
with theConstant
Vulnerabilities
© 2013 Monterey Technology Group Inc.
Thanks to
© 2013 Monterey Technology Group Inc.
www.Lumension.com
Chris Merritt, Director of Solution Marketing
Preview of Key
Points
 Assessment & Identification
 Disabling
 Hardening
 Filtering
 Patching
Background
 This is not about “Java Script”
 No relationship to Java
 Java
 Supported onWindows,OS X, Linux
 Android too, kind of
 Not supported on iOS or Chrome
 What is the component?
 JVM now called JRE
 Installed by default?
 Windows: up to hardware manufacture
 OS X: pre-Lion yes, Lion+ no (more info javatest.org)
 Multiple versions can be installed
 Each browser has its own Java settings
Background
 Important changes with 7.10
 Ensuring the Most Secure JRE
 JRE Expiration Date
 Disabling Java in the Browser
 Setting the Security Level
 Advanced options
 Allow user to grant permissions to signed content
 Show sandbox warning banner
 Allow user to accept JNLP security requests
 Don't prompt for client certificate selection when no certificates or only one
exists
 Warn if site certificate does not match hostname
 Show site certificate even if it is valid
 Install options
Background
 Big changes in v7U21 (see here) …
 security model for signed applets was changed
 default plug-in security settings were changed
 improvements to standardized revocation services (of certs)
 dissociating client/browser use of Java (e.g., affecting home users) and
server use (e.g., affecting enterprise deployments)
 Latest version 1.7.0_25 (v7U25)
 40 security fixes
 http://www.oracle.com/technetwork/topics/security/javacpujun2013-
1899847.html
Assessment &
Identification
 Which versions of Java and related software are installed on your
windows computer?
$cn = get-content env:computername
$cn = “servershare” + $cn + ".txt“
echo "**************************************“ > $cn
Date >> $cn
Get-WmiObject -Class Win32_Product | Select-Object
-Property Name | Where {$_.name -Like "*Java*“-or
$_.name -like "J2SE"} >> $cn
 Add script as startup/logon script via group policy
 Powershell.exe c:fullyqualpathjavalister.ps1
Assessment &
Identification
 Which versions are really being used?
 Windows auditing
 To catch Java EXEs starting
 Enable Process tracking
 Event 4688/592 with “java”
 To catch DLLs
 Necessary?
 Enable File System auditing
 Enable auditing on c:program filesjava
 Look for 4663 with “java”
Assessment &
Identification
 Other questions
 Which browsers is it enabled in?
 http://javatester.org/version.html
Disabling Java
 What about when you need Java on certain websites?
 Disable Java in main browser
 Enable Java in alternate browser used for certain sites
Disabling Java
 Disabling Java
 Altogether
 Chrome
 http://mtwsec.blogspot.ca/2012/08/java-0-day-workarounds-silent-
disabling.html
 IE
 By script: http://support.microsoft.com/kb/2751647
 FireFox
 By script: http://mtwsec.blogspot.ca/2012/08/java-0-day-workarounds-silent-
disabling.html
Uninstall all
versions of
Java
 http://community.spiceworks.com/how_to/show/22997-use-a-batch-
file-and-group-policy-to-cleanly-update-java
 wmic product where "name like 'Java(TM) 6%%'" call uninstall
/nointeractive
wmic product where "name like 'Java(TM) 7%%'" call uninstall
/nointeractive
wmic product where "name like 'Java 7%%'" call uninstall /nointeractive
wmic product where "name like 'JavaFX%%'" call uninstall
/nointeractive
wmic product where "name like 'Java(TM) 7%%'" call uninstall
/nointeractive
wmic product where "name like 'Java(tm) 6%%'" call uninstall
/nointeractive
wmic product where "name like 'J2SE Runtime Environment%%'" call
uninstall /nointeractive
Installing
latest and
enabling
automatic
updates hence
forth
 Group Policy/Software Installation
 MSI files
 http://community.spiceworks.com/how_to/show/22997-use-a-batch-
file-and-group-policy-to-cleanly-update-java
Managing
Java
configuration
 Java normally stores its settings for each user in
 <UserApplication Data
Folder>SunJavaDeploymentdeployment.properties
 Mandate system wide settings with
 <Windows Directory>SunJavaDeploymentdeployment.config
 http://docs.oracle.com/javase/6/docs/technotes/guides/deployment/depl
oyment-guide/properties.html
 http://docs.oracle.com/javase/7/docs/technotes/guides/deployment/depl
oyment-guide/properties.html
 How to do it with group policy
 http://www.darkoperator.com/blog/2013/1/14/centralized-management-
of-java-se-environment-using-gpo-redu.html
Filtering
 Do you have a proxy server?
 Can you filter java applets at the gateway?
 Some firewalls and proxies make this possible.
 Java content removed from web pages
Patching
 Oracle still relies on independent auto-updaters on each endpoint
 Install by MSI
 Download and run the offline installer, but do not complete it. Look in
%userprofile%appdatalocallowsunjava.
 Open the folder jre<update number> and copy the msi and cab files there
to your server share where you deploy your msis. Deploy with group
policy as per normal.
 Silent install from script
 <jre>.exe [/s] [INSTALLDIR=<drive>:<JRE_install_path>] [STATIC=1]
[WEB_JAVA=0/1] [WEB_JAVA_SECURITY_LEVEL=VH/H/M/L]
 http://java.com/en/download/help/silent_install.xml
Bottom line
 Managing Java yourself
 Labor intensive – who has the time?
 Changes with each new version
 Requires fragile scripts
 No reporting/monitoring
 There must be a better way…
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Java
Survival
Guide
Java Remediation Decision Tree
19
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
1 – Know
What
• Scan entire environment for all Java versions
Why
• Discover the scope (depth and breadth) of the Java issue in the environment
How
» Application Scanner – Free Utility from Lumension
» Patch and Remediation – part of the Lumension Endpoint Management and
Security Suite
20
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Application Scanner Dashboard
21
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Java Application Scanner
22
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
2 – Act
What
• How you need Java?
» If No, then remove all instances of Java
» If Yes, then do you need a specific version or the latest version?
Why
• Reduce the scope of the Java issue in the environment by:
» Eliminating where possible
» Updating where possible
» Putting a picket fence where needed
How
» Patch and Remediation – update, standardize
» Content Wizard – remove unwanted versions
23
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Disable Java Browser Plug-ins
24
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
3 – Protect
What
• Stay current with all updates
• Maintain environment in desired state
• Protect against known and unknown (zero-day) malware
Why
• Prevent environment from returning to an unknown and less secure state
How
» Patch and Remediation – maintain
» Application Control – prevent drift and malware
25
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Application Control
26
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
More Information
• Free Java Application Scanner Tool
» Uncover every version of Java in your endpoint
environment to assess, prioritize and manage your
Java risk.
http://www.lumension.com/Resources/Security-
Tools/Java-App-Scanner-Tool.aspx
• Lumension® Endpoint Management
and Security Suite: Patch and
Remediation
» Online Demo Video:
http://www.lumension.com/Resources/Demo-
Center/Vulnerability-Management.aspx
» Free Trial (virtual or download):
http://www.lumension.com/vulnerability-
management/patch-management-software/free-
trial.aspx
27
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
• Surviving Java Resource Center
» Get free access to essential resources to help you
take control of your Java risk – in just 3 steps!
http://www.lumension.com/Resources/Resource-
Center/Java-Resource-Center.aspx
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
info@lumension.com
http://blog.lumension.com

More Related Content

What's hot (19)

PPTX
[Wroclaw #2] Web Application Security Headers
OWASP
 
PDF
Securing Android
Marakana Inc.
 
PDF
Secure Coding for Java - An Introduction
Sebastien Gioria
 
PDF
Web Application Frewall
Abhishek Singh
 
PDF
Dev ops tools and was liberty profile
sflynn073
 
PDF
Augmented reality in your web proxy
Roberto Suggi Liverani
 
PPTX
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
PPTX
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
PDF
Secure Authentication and Session Management in Java EE
Patrycja Wegrzynowicz
 
PDF
Testing Web Based Applications[1]
MBA_Community
 
PDF
Bridging the gap - Security and Software Testing
Roberto Suggi Liverani
 
PPT
OWASP Serbia - A5 cross-site request forgery
Nikola Milosevic
 
PDF
Magento Testing on all fronts
AOE
 
PPTX
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
securityxploded
 
PDF
Rock-solid Magento Deployments (and Development)
AOE
 
PDF
Analyzing the Effectivess of Web Application Firewalls
Larry Suto
 
PDF
CloudFlare vs Incapsula: Round 2
Zero Science Lab
 
PPTX
OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum
 
[Wroclaw #2] Web Application Security Headers
OWASP
 
Securing Android
Marakana Inc.
 
Secure Coding for Java - An Introduction
Sebastien Gioria
 
Web Application Frewall
Abhishek Singh
 
Dev ops tools and was liberty profile
sflynn073
 
Augmented reality in your web proxy
Roberto Suggi Liverani
 
Web Application Security And Getting Into Bug Bounties
kunwaratul hax0r
 
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
 
Secure Authentication and Session Management in Java EE
Patrycja Wegrzynowicz
 
Testing Web Based Applications[1]
MBA_Community
 
Bridging the gap - Security and Software Testing
Roberto Suggi Liverani
 
OWASP Serbia - A5 cross-site request forgery
Nikola Milosevic
 
Magento Testing on all fronts
AOE
 
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
securityxploded
 
Rock-solid Magento Deployments (and Development)
AOE
 
Analyzing the Effectivess of Web Application Firewalls
Larry Suto
 
CloudFlare vs Incapsula: Round 2
Zero Science Lab
 
OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum
 

Viewers also liked (18)

PPTX
Application Explosion How to Manage Productivity vs Security
Lumension
 
PPTX
Windows 7 AppLocker: Understanding its Capabilities and Limitations
Lumension
 
PPT
State of endpoint risk v3
Lumension
 
PPTX
It's Time to Rethink Your Endpoint Strategy
Lumension
 
PPTX
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Lumension
 
PPTX
State of endpoint risk v3
Lumension
 
PDF
تقرير الإستكمال
Hany May
 
PDF
BakeSale Pitch Deck (text heavy)
Ryan Chacon
 
PPTX
Tazkirah ramadhan
Mohd Asmariza Che Mahmood
 
PDF
Skif lan
snobroreelsbac1980
 
PPTX
Galileo galilei
Reana Mondo
 
PDF
ความรู้เบื้่องต้นเกี่ยวกับการสร้างบลอค
Inception Tnz
 
PPTX
Skor A+ sejarah STPM
Karsodikromo Yatiman
 
PPT
2013 sectoren-ecabo-werknemers-ict-ss
Chris Noordam
 
PPT
діяльність комітету доступності у херсонській області
Oleksa Lipko
 
PPT
2013 banen-die-blijven-bestaan
Chris Noordam
 
PPT
2013 indruk-krijgen-techniek-beroepen
Chris Noordam
 
PPTX
Picking Up The Pieces: Rebuilding Your Credit After Financial Disaster
Curtis Rose
 
Application Explosion How to Manage Productivity vs Security
Lumension
 
Windows 7 AppLocker: Understanding its Capabilities and Limitations
Lumension
 
State of endpoint risk v3
Lumension
 
It's Time to Rethink Your Endpoint Strategy
Lumension
 
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Lumension
 
State of endpoint risk v3
Lumension
 
تقرير الإستكمال
Hany May
 
BakeSale Pitch Deck (text heavy)
Ryan Chacon
 
Tazkirah ramadhan
Mohd Asmariza Che Mahmood
 
Galileo galilei
Reana Mondo
 
ความรู้เบื้่องต้นเกี่ยวกับการสร้างบลอค
Inception Tnz
 
Skor A+ sejarah STPM
Karsodikromo Yatiman
 
2013 sectoren-ecabo-werknemers-ict-ss
Chris Noordam
 
діяльність комітету доступності у херсонській області
Oleksa Lipko
 
2013 banen-die-blijven-bestaan
Chris Noordam
 
2013 indruk-krijgen-techniek-beroepen
Chris Noordam
 
Picking Up The Pieces: Rebuilding Your Credit After Financial Disaster
Curtis Rose
 
Ad

Similar to Java Insecurity: How to Deal with the Constant Vulnerabilities (20)

PDF
JavaCro'15 - Managing Java at Scale Security and Compatibility Applications -...
HUJAK - Hrvatska udruga Java korisnika / Croatian Java User Association
 
PDF
Java SE Subscription Workshop
MarketingArrowECS_CZ
 
PPT
Running Java safely
Jane Prusakova
 
PDF
JDK versions and OpenJDK
Wolfgang Weigend
 
PPTX
Java Licensing Roadmap for Oracle License Management
Fredrik Filipsson - Oracle License Expert
 
PDF
JavaSecurityIssuesOverviewHUJAK_20130219
jkrizanic
 
PDF
JavaOne2013: Securing Java in the Server Room - Tim Ellison
Chris Bailey
 
DOC
Do you know security flaws persist in java 7u10 update !
Andolasoft Inc
 
PDF
Oracle Keynote from JMagghreb 2014
Simon Ritter
 
PPTX
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
PDF
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
Raleigh ISSA
 
PPTX
System hardening - OS and Application
edavid2685
 
PDF
It's a jdk jungle out there - JDK 11 and OpenJDK 11
Wolfgang Weigend
 
PDF
Secure JEE Architecture and Programming 101
Mario-Leander Reimer
 
PDF
Java part 1
ACCESS Health Digital
 
PDF
Advanced Java
Hossein Mobasher
 
PDF
Securing Java in the Server Room
Tim Ellison
 
PDF
Java Configuration on Windows Xp
Abdinav Kumar Singh
 
PPT
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
Steve Poole
 
PDF
Patch management
GFI Software
 
JavaCro'15 - Managing Java at Scale Security and Compatibility Applications -...
HUJAK - Hrvatska udruga Java korisnika / Croatian Java User Association
 
Java SE Subscription Workshop
MarketingArrowECS_CZ
 
Running Java safely
Jane Prusakova
 
JDK versions and OpenJDK
Wolfgang Weigend
 
Java Licensing Roadmap for Oracle License Management
Fredrik Filipsson - Oracle License Expert
 
JavaSecurityIssuesOverviewHUJAK_20130219
jkrizanic
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
Chris Bailey
 
Do you know security flaws persist in java 7u10 update !
Andolasoft Inc
 
Oracle Keynote from JMagghreb 2014
Simon Ritter
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
Raleigh ISSA
 
System hardening - OS and Application
edavid2685
 
It's a jdk jungle out there - JDK 11 and OpenJDK 11
Wolfgang Weigend
 
Secure JEE Architecture and Programming 101
Mario-Leander Reimer
 
Advanced Java
Hossein Mobasher
 
Securing Java in the Server Room
Tim Ellison
 
Java Configuration on Windows Xp
Abdinav Kumar Singh
 
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
Steve Poole
 
Patch management
GFI Software
 
Ad

More from Lumension (20)

PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
PPTX
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
PPTX
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
PPTX
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
PPTX
Careto: Unmasking a New Level in APT-ware
Lumension
 
PPTX
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
PPTX
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
PPTX
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
PDF
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
PPTX
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
PPTX
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
PPTX
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
PPTX
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
PPTX
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
PPTX
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
PPTX
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
PDF
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 
PPTX
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Lumension
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Lumension
 

Recently uploaded (20)

PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 

Java Insecurity: How to Deal with the Constant Vulnerabilities

  • 1. Sponsored by Java Insecurity: How to Deal with theConstant Vulnerabilities © 2013 Monterey Technology Group Inc.
  • 2. Thanks to © 2013 Monterey Technology Group Inc. www.Lumension.com Chris Merritt, Director of Solution Marketing
  • 3. Preview of Key Points  Assessment & Identification  Disabling  Hardening  Filtering  Patching
  • 4. Background  This is not about “Java Script”  No relationship to Java  Java  Supported onWindows,OS X, Linux  Android too, kind of  Not supported on iOS or Chrome  What is the component?  JVM now called JRE  Installed by default?  Windows: up to hardware manufacture  OS X: pre-Lion yes, Lion+ no (more info javatest.org)  Multiple versions can be installed  Each browser has its own Java settings
  • 5. Background  Important changes with 7.10  Ensuring the Most Secure JRE  JRE Expiration Date  Disabling Java in the Browser  Setting the Security Level  Advanced options  Allow user to grant permissions to signed content  Show sandbox warning banner  Allow user to accept JNLP security requests  Don't prompt for client certificate selection when no certificates or only one exists  Warn if site certificate does not match hostname  Show site certificate even if it is valid  Install options
  • 6. Background  Big changes in v7U21 (see here) …  security model for signed applets was changed  default plug-in security settings were changed  improvements to standardized revocation services (of certs)  dissociating client/browser use of Java (e.g., affecting home users) and server use (e.g., affecting enterprise deployments)  Latest version 1.7.0_25 (v7U25)  40 security fixes  http://www.oracle.com/technetwork/topics/security/javacpujun2013- 1899847.html
  • 7. Assessment & Identification  Which versions of Java and related software are installed on your windows computer? $cn = get-content env:computername $cn = “servershare” + $cn + ".txt“ echo "**************************************“ > $cn Date >> $cn Get-WmiObject -Class Win32_Product | Select-Object -Property Name | Where {$_.name -Like "*Java*“-or $_.name -like "J2SE"} >> $cn  Add script as startup/logon script via group policy  Powershell.exe c:fullyqualpathjavalister.ps1
  • 8. Assessment & Identification  Which versions are really being used?  Windows auditing  To catch Java EXEs starting  Enable Process tracking  Event 4688/592 with “java”  To catch DLLs  Necessary?  Enable File System auditing  Enable auditing on c:program filesjava  Look for 4663 with “java”
  • 9. Assessment & Identification  Other questions  Which browsers is it enabled in?  http://javatester.org/version.html
  • 10. Disabling Java  What about when you need Java on certain websites?  Disable Java in main browser  Enable Java in alternate browser used for certain sites
  • 11. Disabling Java  Disabling Java  Altogether  Chrome  http://mtwsec.blogspot.ca/2012/08/java-0-day-workarounds-silent- disabling.html  IE  By script: http://support.microsoft.com/kb/2751647  FireFox  By script: http://mtwsec.blogspot.ca/2012/08/java-0-day-workarounds-silent- disabling.html
  • 12. Uninstall all versions of Java  http://community.spiceworks.com/how_to/show/22997-use-a-batch- file-and-group-policy-to-cleanly-update-java  wmic product where "name like 'Java(TM) 6%%'" call uninstall /nointeractive wmic product where "name like 'Java(TM) 7%%'" call uninstall /nointeractive wmic product where "name like 'Java 7%%'" call uninstall /nointeractive wmic product where "name like 'JavaFX%%'" call uninstall /nointeractive wmic product where "name like 'Java(TM) 7%%'" call uninstall /nointeractive wmic product where "name like 'Java(tm) 6%%'" call uninstall /nointeractive wmic product where "name like 'J2SE Runtime Environment%%'" call uninstall /nointeractive
  • 13. Installing latest and enabling automatic updates hence forth  Group Policy/Software Installation  MSI files  http://community.spiceworks.com/how_to/show/22997-use-a-batch- file-and-group-policy-to-cleanly-update-java
  • 14. Managing Java configuration  Java normally stores its settings for each user in  <UserApplication Data Folder>SunJavaDeploymentdeployment.properties  Mandate system wide settings with  <Windows Directory>SunJavaDeploymentdeployment.config  http://docs.oracle.com/javase/6/docs/technotes/guides/deployment/depl oyment-guide/properties.html  http://docs.oracle.com/javase/7/docs/technotes/guides/deployment/depl oyment-guide/properties.html  How to do it with group policy  http://www.darkoperator.com/blog/2013/1/14/centralized-management- of-java-se-environment-using-gpo-redu.html
  • 15. Filtering  Do you have a proxy server?  Can you filter java applets at the gateway?  Some firewalls and proxies make this possible.  Java content removed from web pages
  • 16. Patching  Oracle still relies on independent auto-updaters on each endpoint  Install by MSI  Download and run the offline installer, but do not complete it. Look in %userprofile%appdatalocallowsunjava.  Open the folder jre<update number> and copy the msi and cab files there to your server share where you deploy your msis. Deploy with group policy as per normal.  Silent install from script  <jre>.exe [/s] [INSTALLDIR=<drive>:<JRE_install_path>] [STATIC=1] [WEB_JAVA=0/1] [WEB_JAVA_SECURITY_LEVEL=VH/H/M/L]  http://java.com/en/download/help/silent_install.xml
  • 17. Bottom line  Managing Java yourself  Labor intensive – who has the time?  Changes with each new version  Requires fragile scripts  No reporting/monitoring  There must be a better way…
  • 18. PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION Java Survival Guide
  • 19. Java Remediation Decision Tree 19 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 20. 1 – Know What • Scan entire environment for all Java versions Why • Discover the scope (depth and breadth) of the Java issue in the environment How » Application Scanner – Free Utility from Lumension » Patch and Remediation – part of the Lumension Endpoint Management and Security Suite 20 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 21. Application Scanner Dashboard 21 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 22. Java Application Scanner 22 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 23. 2 – Act What • How you need Java? » If No, then remove all instances of Java » If Yes, then do you need a specific version or the latest version? Why • Reduce the scope of the Java issue in the environment by: » Eliminating where possible » Updating where possible » Putting a picket fence where needed How » Patch and Remediation – update, standardize » Content Wizard – remove unwanted versions 23 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 24. Disable Java Browser Plug-ins 24 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 25. 3 – Protect What • Stay current with all updates • Maintain environment in desired state • Protect against known and unknown (zero-day) malware Why • Prevent environment from returning to an unknown and less secure state How » Patch and Remediation – maintain » Application Control – prevent drift and malware 25 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 26. Application Control 26 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 27. More Information • Free Java Application Scanner Tool » Uncover every version of Java in your endpoint environment to assess, prioritize and manage your Java risk. http://www.lumension.com/Resources/Security- Tools/Java-App-Scanner-Tool.aspx • Lumension® Endpoint Management and Security Suite: Patch and Remediation » Online Demo Video: http://www.lumension.com/Resources/Demo- Center/Vulnerability-Management.aspx » Free Trial (virtual or download): http://www.lumension.com/vulnerability- management/patch-management-software/free- trial.aspx 27 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION • Surviving Java Resource Center » Get free access to essential resources to help you take control of your Java risk – in just 3 steps! http://www.lumension.com/Resources/Resource- Center/Java-Resource-Center.aspx
  • 28. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 [email protected] http://blog.lumension.com

Editor's Notes

  • #20: Notes: This decision tree could be applied across the entire organization as a whole; however, more likely any department, group or even individual will be unique in their needs. This decision tree could be applied across both server and endpoint environments. Determining the need for Java is likely unique by organization, department, group or even individual user; be sure to consider both vendor-supplied and in-house developed applications. There may be legitimate reasons for maintaining old versions of Java in your organization; if this is the case, then strategies to minimize the risk must be considered. A common recommendation is disable Java plug-ins in the browser(s); this configuration will greatly reduce common attack vectors.