lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 Apr 2010 12:15:33 +0200
From: Kristof Zelechovski <giecrilj@...gny.2a.pl>
To: "'Full-Disclosure'" <full-disclosure@...ts.grok.org.uk>
Subject: How to disable Java Deployment Toolkit
Regarding the Java Deployment
<http://seclists.org/fulldisclosure/2010/Apr/119> Toolkit vulnerability:
On Windows XP and later: open the Local Security Settings console and create
a prohibition <ms-its:C:\WINDOWS\help\SAFERconcepts.chm::/SRP_path.htm>
rule for the path
%HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Web
Start\1.6.0_19\HOME%/JAVAWS.EXE
After you do that, the demo
<http://lock.cmpxchg8b.com/bb5eafbc6c6e67e11c4afc88b4e1dd22/testcase.html>
exploit should not work any more.
HTH,
Chris
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists