Re: Java zero-day exploit - how to install in Ubuntu?
Thanks, everyone. I looked at the "strikingly simple method" and wish Linux had the ease of Windows for once. In my Win7 calling Java and then clicking update was all that was needed.
MEANWHILE: I found that OpenDNS blocks that exploit. OpenDNS uses their own DNS router numbers and I've changed my router to use theirs.
You can inform yourself about that here:
what follows this line is some of the text of that blog:
Java 0-Day Details
by Dan Hubbard, CTO on Aug 31st, 2012
Earlier this week, the security community learned that CVE-2012-4681, a recent Java-based zero-day vulnerability, is being leveraged to attack client machines, and fear it will cause large-scale infections soon. The vulnerability was reportedly discovered about four months ago, but iust became public knowledge last Sunday.
What does OpenDNS know about this exploit?
So far we have collected over 200 different domains.
These domains are hosted on 26 different server IP addresses.
These servers are located in 7 different countries: Russia (6 locations), US (11 locations), UK (1 location), Germany (3 locations), Luxembourg (2 locations), Hong Kong, and Romania. One server IP in Romania hosts over 80 domains involved with this exploit.
These domain names all seem to be registered via changeip.com and are likely dynamic DNS domains.
At the time of writing of this blog, the OpenDNS research team has observed DNS queries to only 23 domains from the 200+ domains identified in the wild. You may observe the traffic spiking in the last few days in the figure below. The remaining domains are not showing any traffic yet, but this may rapidly change as users unknowingly visit these infected domains and their machines will in turn get compromised.
. . .
Are you protected against this exploit?
YES, if you’re currently using OpenDNS to resolve your DNS requests.
Not using OpenDNS yet? Simply create a free account, choose your router or computer and follow the step-by-step instructions.
We are collaborating with other security vendors, which are tracking the domains and IPs of malicious servers hosting these exploits.
Domains and IPs associated with this threat are included in our malware category and are being updated as new sites come online.
For me, this is the easier way. Again, thank you, Linux Community.
AMD Athlon II X4 620, 4gig ddr2-800, m/b MSI K9N6PGM2, 1T SATA, EVGA 9500GT, Canon MB2320 all-in-one, LG DVD-rom GSA-H55N