OmegaT on LinuxMint - is Java Zero Day vulnerability a concern?
论题张贴者: Ronja Addams-Moring
Ronja Addams-Moring
Ronja Addams-Moring  Identity Verified
芬兰
Local time: 18:44
Finnish芬兰语译成Swedish瑞典语
+ ...
Aug 28, 2012

I use locally installed OmegaT on a LinuxMint 13 laptop. OmegaT requires Java, and for about the last 48 hours various usually reliably sources have been spreading the message "Uninstall Java - dangerous security vulnerability!" (see link list at the end)

However, when reading the news more carefully, it appears that the malware that exploits this vulnerability AT LEAST THUS FAR has:

a) only been able to exploit Java 7 (not e.g. Java 6)
b) only? been able to explo
... See more
I use locally installed OmegaT on a LinuxMint 13 laptop. OmegaT requires Java, and for about the last 48 hours various usually reliably sources have been spreading the message "Uninstall Java - dangerous security vulnerability!" (see link list at the end)

However, when reading the news more carefully, it appears that the malware that exploits this vulnerability AT LEAST THUS FAR has:

a) only been able to exploit Java 7 (not e.g. Java 6)
b) only? been able to exploit Oracle's Java 7 (not OpenJRE - ?)
c) only targeted web browsers with Java enabled, and none of my web browser settings allow Java
d) only? attempted to install Windows rootkits/viruses, which naturally would not harm Linux systems

However, as the vulnerability is in (Oracle's ?) Java 7 itself, both Windows, Mac OS/X and Linux systems are vulnerable, and at least on Ubuntu the vulnerability has been tested to be exploitable.

Does anyone here know any deeper details about this particular Zero Day vulnerability and whether anyone has reported that it would be able to infect a system through any other means than through a browser (clicking on a contaminated link while having Java 7 enabled)? Also, how certain is the information that this bug only exists in Oracle's Java, and not in OpenJRE?


Further information:

A fairly good summary, with lots of links: http://www.zdnet.com/java-zero-day-vulnerability-actively-used-in-targeted-attacks-7000003233/

Fairly understandable, longer blog post: http://www.informationweek.com/security/attacks/java-zero-day-attack-could-hit-enterpris/240006341

The most technically thorough description of this bug I have found thus far: http://erratasec.blogspot.co.uk/2012/08/new-java-0day.html
Collapse


 
Didier Briel
Didier Briel  Identity Verified
法国
Local time: 17:44
English英语译成French法语
+ ...
Unlikely Aug 28, 2012

Ronja Addams-Moring wrote:
I use locally installed OmegaT on a LinuxMint 13 laptop. OmegaT requires Java, and for about the last 48 hours various usually reliably sources have been spreading the message "Uninstall Java - dangerous security vulnerability!" (see link list at the end)

However, when reading the news more carefully, it appears that the malware that exploits this vulnerability AT LEAST THUS FAR has:

a) only been able to exploit Java 7 (not e.g. Java 6)

The embedded Java provided with OmegaT is Java 1.6.

You can disable your system-wide Java, and still use OmegaT.


b) only? been able to exploit Oracle's Java 7 (not OpenJRE - ?)
c) only targeted web browsers with Java enabled, and none of my web browser settings allow Java
d) only? attempted to install Windows rootkits/viruses, which naturally would not harm Linux systems

However, as the vulnerability is in (Oracle's ?) Java 7 itself, both Windows, Mac OS/X and Linux systems are vulnerable, and at least on Ubuntu the vulnerability has been tested to be exploitable.

Does anyone here know any deeper details about this particular Zero Day vulnerability and whether anyone has reported that it would be able to infect a system through any other means than through a browser (clicking on a contaminated link while having Java 7 enabled)?

To get Java compromised through OmegaT, OmegaT would have to connect to a corrupted server. The only way I can think it could happen is if the user would voluntarily enter the URL in Options > Spell Checking. And even then, I don't think it would work, since OmegaT wouldn't download any .jar from that location.

Didier


 


本论坛没有专门指派版主。
如需报告网站违规或寻求帮助,请联系网站工作人员 »


OmegaT on LinuxMint - is Java Zero Day vulnerability a concern?






Trados Studio 2022 Freelance
The leading translation software used by over 270,000 translators.

Designed with your feedback in mind, Trados Studio 2022 delivers an unrivalled, powerful desktop and cloud solution, empowering you to work in the most efficient and cost-effective way.

More info »
CafeTran Espresso
You've never met a CAT tool this clever!

Translate faster & easier, using a sophisticated CAT tool built by a translator / developer. Accept jobs from clients who use Trados, MemoQ, Wordfast & major CAT tools. Download and start using CafeTran Espresso -- for free

Buy now! »