{"id":256,"date":"2012-03-28T17:16:39","date_gmt":"2012-03-28T17:16:39","guid":{"rendered":"http:\/\/www.bsk-consulting.de\/?p=256"},"modified":"2022-03-25T14:11:33","modified_gmt":"2022-03-25T13:11:33","slug":"java-schwachstelle","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/","title":{"rendered":"Java Schwachstelle"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.4.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243;]Das im Browser als Plugin hinterlegte Java Runtime Environment wei\u00dft wieder einmal eine schwerwiegende Schwachstelle auf, die Angreifer derzeit gezielt ausnutzen. Nach Angaben von <a title=\"Kritische Java-L\u00fccke wird im gro\u00dfen Stil ausgenutzt\" href=\"http:\/\/www.heise.de\/security\/meldung\/Kritische-Java-Luecke-wird-im-grossen-Stil-ausgenutzt-1485195.html\" target=\"_blank\" rel=\"noopener noreferrer\">heise Security<\/a>\u00a0wurde eine Exploit, welches diese L\u00fccke adressiert, in das BlackHole Exploit-Kit aufgenommen.<br \/>\nSie sollten so bald wie m\u00f6glich auf allen Arbeitsstationen mit Internetzugang eine aktuelle Version installieren oder Java gegebenenfalls deaktivieren, falls es betrieblich nicht\u00a0zwingend erforderlich ist.<br \/>\nUnter diesem <a title=\"Java Version Check\" href=\"http:\/\/www.java.com\/de\/download\/installed.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a> k\u00f6nnen Sie die aktuell in Ihrem Browser verwendete Java Version bestimmen lassen.<br \/>\nJava kontrollieren und ggfs. deaktivieren f\u00fcr den verschiedenen Browser:<br \/>\n<strong>Internet Explorer 8<\/strong><br \/>\nUnter Extras &gt; Add-ons verwalten<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-257\" title=\"Selection_280312_004\" src=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_004-300x169.png\" alt=\"\" width=\"300\" height=\"169\" \/><br \/>\n<strong>Mozilla Firefox<\/strong><br \/>\nUnter Extras (bzw. Firefox Button) &gt; Add-ons &gt; Plugins<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-259\" title=\"Selection_280312_006\" src=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_006-300x133.png\" alt=\"\" width=\"300\" height=\"133\" \/><br \/>\n<strong>Google Chrome<\/strong><br \/>\nIn der URL-Leiste (Omibar) eingeben: about:plugins<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-258\" title=\"Selection_280312_005\" src=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_005-300x248.png\" alt=\"\" width=\"300\" height=\"248\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/Selection_280312_005-300x248.png 300w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/Selection_280312_005.png 401w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Das im Browser als Plugin hinterlegte Java Runtime Environment wei\u00dft wieder einmal eine schwerwiegende Schwachstelle auf, die Angreifer derzeit gezielt ausnutzen. Nach Angaben von heise Security\u00a0wurde eine Exploit, welches diese L\u00fccke adressiert, in das BlackHole Exploit-Kit aufgenommen. Sie sollten so bald wie m\u00f6glich auf allen Arbeitsstationen mit Internetzugang eine aktuelle Version installieren oder Java gegebenenfalls deaktivieren, falls es betrieblich nicht\u00a0zwingend erforderlich ist. Unter diesem Link k\u00f6nnen Sie die aktuell in Ihrem Browser verwendete Java Version bestimmen lassen. Java kontrollieren und ggfs. deaktivieren f\u00fcr den verschiedenen Browser: Internet Explorer 8 Unter Extras &gt; Add-ons verwalten Mozilla Firefox Unter Extras (bzw. Firefox Button) &gt; Add-ons &gt; Plugins Google Chrome In der URL-Leiste (Omibar) eingeben: about:plugins<\/p>\n","protected":false},"author":1,"featured_media":270,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Das im Browser als Plugin hinterlegte Java Runtime Environment wei\u00dft wieder einmal eine schwerwiegende Schwachstelle auf, die Angreifer derzeit gezielt ausnutzen. Nach Angaben von <a title=\"Kritische Java-L\u00fccke wird im gro\u00dfen Stil ausgenutzt\" href=\"http:\/\/www.heise.de\/security\/meldung\/Kritische-Java-Luecke-wird-im-grossen-Stil-ausgenutzt-1485195.html\" target=\"_blank\" rel=\"noopener noreferrer\">heise Security<\/a>\u00a0wurde eine Exploit, welches diese L\u00fccke adressiert, in das BlackHole Exploit-Kit aufgenommen.\r\nSie sollten so bald wie m\u00f6glich auf allen Arbeitsstationen mit Internetzugang eine aktuelle Version installieren oder Java gegebenenfalls deaktivieren, falls es betrieblich nicht\u00a0zwingend erforderlich ist.\r\nUnter diesem <a title=\"Java Version Check\" href=\"http:\/\/www.java.com\/de\/download\/installed.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a> k\u00f6nnen Sie die aktuell in Ihrem Browser verwendete Java Version bestimmen lassen.\r\nJava kontrollieren und ggfs. deaktivieren f\u00fcr den verschiedenen Browser:\r\n<strong>Internet Explorer 8<\/strong>\r\nUnter Extras &gt; Add-ons verwalten\r\n<a href=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_004.png\"><img class=\"alignnone size-medium wp-image-257\" title=\"Selection_280312_004\" src=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_004-300x169.png\" alt=\"\" width=\"300\" height=\"169\" \/><\/a>\r\n<strong>Mozilla Firefox<\/strong>\r\nUnter Extras (bzw. Firefox Button) &gt; Add-ons &gt; Plugins\r\n<a href=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_006.png\"><img class=\"alignnone size-medium wp-image-259\" title=\"Selection_280312_006\" src=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_006-300x133.png\" alt=\"\" width=\"300\" height=\"133\" \/><\/a>\r\n<strong>Google Chrome<\/strong>\r\nIn der URL-Leiste (Omibar) eingeben: about:plugins\r\n<a href=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_005.png\"><img class=\"alignnone size-medium wp-image-258\" title=\"Selection_280312_005\" src=\"\/wp-content\/uploads\/2012\/03\/Selection_280312_005-300x248.png\" alt=\"\" width=\"300\" height=\"248\" \/><\/a>\r\n&nbsp;","_et_gb_content_width":"","footnotes":""},"categories":[327,335],"tags":[336,337,51,338,339,340,341],"class_list":["post-256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alert","category-security-fix","tag-blackhole","tag-driveby","tag-exploit","tag-java","tag-plugins","tag-schwachstelle","tag-web-client-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Java Schwachstelle - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Java Schwachstelle\",\"datePublished\":\"2012-03-28T17:16:39+00:00\",\"dateModified\":\"2022-03-25T13:11:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/\"},\"wordCount\":193,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg\",\"keywords\":[\"BlackHole\",\"Driveby\",\"Exploit\",\"Java\",\"Plugins\",\"Schwachstelle\",\"Web Client Security\"],\"articleSection\":[\"Alert\",\"Security Fix\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/\",\"name\":\"Java Schwachstelle - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg\",\"datePublished\":\"2012-03-28T17:16:39+00:00\",\"dateModified\":\"2022-03-25T13:11:33+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg\",\"width\":680,\"height\":453},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Java Schwachstelle - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Java Schwachstelle","datePublished":"2012-03-28T17:16:39+00:00","dateModified":"2022-03-25T13:11:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/"},"wordCount":193,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg","keywords":["BlackHole","Driveby","Exploit","Java","Plugins","Schwachstelle","Web Client Security"],"articleSection":["Alert","Security Fix"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/","url":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/","name":"Java Schwachstelle - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg","datePublished":"2012-03-28T17:16:39+00:00","dateModified":"2022-03-25T13:11:33+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2012\/03\/28\/java-schwachstelle\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/1320254_52957540.jpg","width":680,"height":453},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":3,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/256\/revisions"}],"predecessor-version":[{"id":7651,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/256\/revisions\/7651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/270"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}