SlideShare a Scribd company logo
1 of 20
Understanding the
Ins and Outs of
Java Vulnerabilities
and what to do
about it
Paul Henry, Security and Forensics Expert
Russ Ernst, Group Product Manager


March 2013
History of Malware

                                                                                                                                                                                       APTs



                                                                                                                                                        Crimeware
                                                                                              You’ve Got Mail                       Came of age in 2007 with Mpack
                                                                               Email attachments became the
                                                                              vehicle of choice in the late „90s

      Elk Cloner                                   A Floppy Delivery
      One of the first recorded PC                 Brian, Jerusalem, Morris
      malware / virus incidents was                Worm, Michelangelo                                                       You’ve Got More Mail
      Elk Cloner back in 1982.                                                                                             Emailed malware attacks
                                                                                                                                  see a resurgence

‘82                                   ’86-’91                    Early ’90s                           Late ’90s                    ’00-’02            ‘04     ‘05      ‘07     ’07-’08        ‘09


                                                                    Macros                                               http://
                                      In the early „90s, macro viruses were                   CodeRed, Nimda, FriendGreetings,
                                                                                                                                                  RootKits
                                           the most popular deliver method                                                              Phishing aided this
                                                                                                   SoBig, Blaster and Slammer
                                                                                                                                              attack vector




                                                                                                                                                                    SQL Injections
                                                                                                                                                              And stolen credentials
                                                                                                                                                                began to take off in
                                                                                                                                                                        2007 - 2008
Explosion of Malware

In the 1990s, the unique instances of malware began
explosive growth
 »   In 1990 = 9,044 samples
 »   In 1994 = 28,613
 »   In 1999 = 98,428
 »   In 2005 = 333,425
 »   In 2006 = 972,606
 »   In 2007 (most dramatic jump) = 5,490,960 samples
      •   Since 2007 malware samples have more then doubled each and every
          year
What Can We Learn From History?

We have been fighting the wrong battle
 » Our efforts have focused on the delivery of malware, not the endgame
   of running malicious code in our environments


We simply can not keep up with the seemingly unlimited ways
malware can be delivered
 » Obfuscation has also rendered our most common defensive methods
   obsolete
Definition Of Insanity

in·san·i·ty (n) :       Doing the same thing over and over again and
                        expecting a different result


» Continuing down our current path means we will still be talking about
  this issue for the next 25 years

» There is a much more effective solution!
Looking Specifically At Java

                                               1,342 “Java” related issues
                                                » Covers 129 different products
                                                » Looking only at Oracle Java, there
                                                  are 159 reported issues


                                               Yes, any company that writes
                                               code will have issues but a
                                               secure coding effort can help
                                               reduce the number of issues
                                               (Microsoft is a good example)
 Secunia Advisory and Vulnerability Database
Its Java Not JavaScript

                  The current Java issues are
                  with the Java browser plugin.
                  They are not with:
                   » Enterprise Java Beans
                   » Embedded Java
                   » JavaFX
                   » JavaScript
Oracle Is Slow To Fix Problems?

                 In September of 2012, Gowdiak
                 at Security Explorations said
                 that of 29 issues reported this
                 year to Oracle, and two
                 reported to Apple, there are still
                 25 issues remaining yet to be
                 addressed by Oracle
                  » http://www.informationweek.com/
                    security/attacks/java-still-not-safe-
                    security-experts-say/240006876
Oracle Is Slow To Fix Problems?

On March 4th 2012, Security Explorations issued
Proof Of Concept code to Oracle for 60 issues
 » Oracle focuses effort on patches for exploits known to be
   actively used in the wild; consequently there is a
   significant pipeline of unpatched vulnerabilities that are
   cause for valid concern
 » Some discovered in 2012 remain unpatched today
Oracle Is Sloppy?

                    With the recent emergency
                    release of 2 patches for Java 7
                    Oracle inadvertently made a
                    previously undisclosed
                    vulnerability exploitable
                     » Java 7 was the result of 5 years
                      of development but some are
                      questioning if enough time was
                      provided in testing before its
                      release
Oracle Is Sloppy?

 Within days of the release of patches for Java 7
u11, security researcher Adam Gowdiak reported
two new vulnerabilities including a complete Java
Sandbox bypass
 » In his own words “although it locked the office door in
   update 7u11, Oracle left the entrance to the building open”
Apple Dangerously Out of Sync?

                In September 2012, Apple fell
                dangerously out of sync with
                Oracle by releasing what users
                thought was a Java patch for
                current Java issues that only
                patched one issue. This left
                users woefully exposed to the
                unpatched issue
                 » http://blog.lumension.com/5869/d
                   eja-vu-apple-dangerously-out-of-
                   sync-with-oracle-patch/
Current State Of Java 15 Insecurity

» We received patches from Java on February 1st that
  corrected 50 issues;

» We received patches on February 19th that corrected yet
  another 6 issues;

» Since the February 19th patches, 2 new issues have been
  reported bringing the total to 7 known vulnerabilities in the
  latest release;

» At Pwn2Own last week 3 more vulnerabilities were made
  public.
Never Ending Headlines
What Can You Do Right Now?

 Only allow Java on specific PC‟s that require Java
to reduce the overall enterprise Threat Envelope
  1. Identify if there is a real business or usability need for
     the Java plugin by the general user population.
  2. Identify assets that do not require the Java plugin and
     ensure that the plugin is disabled.
  3. Ensure that all Java plugin instances are patched on
     an aggressive schedule.
  4. Isolate critical systems that are business process
     sensitive from the production environment as much as
     possible.
Wouldn’t it Be Easier to Abandon Java?

•Turning off Java sounds easy
 » Apple regularly does it automatically with no notification
 » Are you sure you‟ve removed all instances of Java?


•Does eliminating Java really solve the problem?
 » Do your line of business applications require Java?
Focus On The End Game

The best approach is to use mitigating layered
controls and processes on endpoints including:
 » Application control whitelisting to defend against unknown payloads;
 » Enable native memory security controls in Windows including DEP
   and ASLR to limit the success of generic memory based attacks;
 » Deploy advanced memory-injection attack protection including RMI
   and Skape/JT to interrupt advanced memory attacks;
 » Use device control to block USB-borne malware;
 » Utilize strong patch management practices;
 » Blacklist outdated plugin versions;
 » Adopt the concept of least privilege for end users.
Defense-in-Depth Strategy
                                            Successful risk mitigation starts
                     AV                     with a solid vulnerability manage-
                   Control
                 the Known                  ment foundation, augmented by
                                            additional layered defenses which
            Device Control
               Control the Flow             go beyond the traditional blacklist
                                            approach.
           Hard Drive and
          Media Encryption
              Control the Data


        Application Control
              Control the Grey



Patch and Configuration Management
      Control the Vulnerability Landscape




18
More Information
• Free Security Scanner Tools                    • Get a Quote (and more)
 » Application Scanner – discover all the apps    http://www.lumension.com/endpoint-
   being used in your network                     management-security-suite/buy-now.aspx#2
 » Vulnerability Scanner – discover all OS and
   application vulnerabilities on your network
 » http://www.lumension.com/special-
   offer/premium-security-tools.aspx


• Lumension® Endpoint Management
  and Security Suite (L.E.M.S.S.)
 » Online Demo Video:
   http://www.lumension.com/endpoint-
   management-security-suite/demo-in-
   detail.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/endpoint-
   management-security-suite/free-trial.aspx




19
Global Headquarters
8660 E. Hartford Drive
Suite 300
Scottsdale, AZ 85250

1.888.725.7828
info@lumension.com

More Related Content

More from Lumension

Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

More from Lumension (20)

Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 

Recently uploaded

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Understanding the Ins and Outs of Java Vulnerabilities and What to do About It

  • 1. Understanding the Ins and Outs of Java Vulnerabilities and what to do about it Paul Henry, Security and Forensics Expert Russ Ernst, Group Product Manager March 2013
  • 2. History of Malware APTs Crimeware You’ve Got Mail Came of age in 2007 with Mpack Email attachments became the vehicle of choice in the late „90s Elk Cloner A Floppy Delivery One of the first recorded PC Brian, Jerusalem, Morris malware / virus incidents was Worm, Michelangelo You’ve Got More Mail Elk Cloner back in 1982. Emailed malware attacks see a resurgence ‘82 ’86-’91 Early ’90s Late ’90s ’00-’02 ‘04 ‘05 ‘07 ’07-’08 ‘09 Macros http:// In the early „90s, macro viruses were CodeRed, Nimda, FriendGreetings, RootKits the most popular deliver method Phishing aided this SoBig, Blaster and Slammer attack vector SQL Injections And stolen credentials began to take off in 2007 - 2008
  • 3. Explosion of Malware In the 1990s, the unique instances of malware began explosive growth » In 1990 = 9,044 samples » In 1994 = 28,613 » In 1999 = 98,428 » In 2005 = 333,425 » In 2006 = 972,606 » In 2007 (most dramatic jump) = 5,490,960 samples • Since 2007 malware samples have more then doubled each and every year
  • 4. What Can We Learn From History? We have been fighting the wrong battle » Our efforts have focused on the delivery of malware, not the endgame of running malicious code in our environments We simply can not keep up with the seemingly unlimited ways malware can be delivered » Obfuscation has also rendered our most common defensive methods obsolete
  • 5. Definition Of Insanity in·san·i·ty (n) : Doing the same thing over and over again and expecting a different result » Continuing down our current path means we will still be talking about this issue for the next 25 years » There is a much more effective solution!
  • 6. Looking Specifically At Java 1,342 “Java” related issues » Covers 129 different products » Looking only at Oracle Java, there are 159 reported issues Yes, any company that writes code will have issues but a secure coding effort can help reduce the number of issues (Microsoft is a good example) Secunia Advisory and Vulnerability Database
  • 7. Its Java Not JavaScript The current Java issues are with the Java browser plugin. They are not with: » Enterprise Java Beans » Embedded Java » JavaFX » JavaScript
  • 8. Oracle Is Slow To Fix Problems? In September of 2012, Gowdiak at Security Explorations said that of 29 issues reported this year to Oracle, and two reported to Apple, there are still 25 issues remaining yet to be addressed by Oracle » http://www.informationweek.com/ security/attacks/java-still-not-safe- security-experts-say/240006876
  • 9. Oracle Is Slow To Fix Problems? On March 4th 2012, Security Explorations issued Proof Of Concept code to Oracle for 60 issues » Oracle focuses effort on patches for exploits known to be actively used in the wild; consequently there is a significant pipeline of unpatched vulnerabilities that are cause for valid concern » Some discovered in 2012 remain unpatched today
  • 10. Oracle Is Sloppy? With the recent emergency release of 2 patches for Java 7 Oracle inadvertently made a previously undisclosed vulnerability exploitable » Java 7 was the result of 5 years of development but some are questioning if enough time was provided in testing before its release
  • 11. Oracle Is Sloppy? Within days of the release of patches for Java 7 u11, security researcher Adam Gowdiak reported two new vulnerabilities including a complete Java Sandbox bypass » In his own words “although it locked the office door in update 7u11, Oracle left the entrance to the building open”
  • 12. Apple Dangerously Out of Sync? In September 2012, Apple fell dangerously out of sync with Oracle by releasing what users thought was a Java patch for current Java issues that only patched one issue. This left users woefully exposed to the unpatched issue » http://blog.lumension.com/5869/d eja-vu-apple-dangerously-out-of- sync-with-oracle-patch/
  • 13. Current State Of Java 15 Insecurity » We received patches from Java on February 1st that corrected 50 issues; » We received patches on February 19th that corrected yet another 6 issues; » Since the February 19th patches, 2 new issues have been reported bringing the total to 7 known vulnerabilities in the latest release; » At Pwn2Own last week 3 more vulnerabilities were made public.
  • 15. What Can You Do Right Now? Only allow Java on specific PC‟s that require Java to reduce the overall enterprise Threat Envelope 1. Identify if there is a real business or usability need for the Java plugin by the general user population. 2. Identify assets that do not require the Java plugin and ensure that the plugin is disabled. 3. Ensure that all Java plugin instances are patched on an aggressive schedule. 4. Isolate critical systems that are business process sensitive from the production environment as much as possible.
  • 16. Wouldn’t it Be Easier to Abandon Java? •Turning off Java sounds easy » Apple regularly does it automatically with no notification » Are you sure you‟ve removed all instances of Java? •Does eliminating Java really solve the problem? » Do your line of business applications require Java?
  • 17. Focus On The End Game The best approach is to use mitigating layered controls and processes on endpoints including: » Application control whitelisting to defend against unknown payloads; » Enable native memory security controls in Windows including DEP and ASLR to limit the success of generic memory based attacks; » Deploy advanced memory-injection attack protection including RMI and Skape/JT to interrupt advanced memory attacks; » Use device control to block USB-borne malware; » Utilize strong patch management practices; » Blacklist outdated plugin versions; » Adopt the concept of least privilege for end users.
  • 18. Defense-in-Depth Strategy Successful risk mitigation starts AV with a solid vulnerability manage- Control the Known ment foundation, augmented by additional layered defenses which Device Control Control the Flow go beyond the traditional blacklist approach. Hard Drive and Media Encryption Control the Data Application Control Control the Grey Patch and Configuration Management Control the Vulnerability Landscape 18
  • 19. More Information • Free Security Scanner Tools • Get a Quote (and more) » Application Scanner – discover all the apps http://www.lumension.com/endpoint- being used in your network management-security-suite/buy-now.aspx#2 » Vulnerability Scanner – discover all OS and application vulnerabilities on your network » http://www.lumension.com/special- offer/premium-security-tools.aspx • Lumension® Endpoint Management and Security Suite (L.E.M.S.S.) » Online Demo Video: http://www.lumension.com/endpoint- management-security-suite/demo-in- detail.aspx » Free Trial (virtual or download): http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx 19
  • 20. Global Headquarters 8660 E. Hartford Drive Suite 300 Scottsdale, AZ 85250 1.888.725.7828 info@lumension.com