Just five days after a Google researcher published information of an unpatched Java bug, a compromised song lyrics site is sending users to a Russian attack server exploiting the flaw to install malware, an antivirus firm said today.
Last Friday, Google's Tavis Ormandy posted details of the Java vulnerability to the Full Disclosure security mailing list, spelling out how attackers could run unauthorised Java programs on a victim's machine by using a feature designed to let developers distribute their software. According to Ormandy, all versions of Java for Windows since SE 6 update 10 - which debuted two years ago - are vulnerable. Other operating systems running Java are unaffected, he said.
Roger Thompson, chief research officer at AVG Technologies, said Songlyrics.com was unwittingly redirecting users to a Russian attack server feeding Ormandy's exploit to victims.
Songlyrics.com includes an IFRAME that shunts visitors to the Russian site, where users are subjected to assault from both Ormandy's exploit as well as a larger-scale exploit toolkit.
"Typically, they throw a whole bunch [of exploits at victims] at once and see what sticks," said Thompson via instant message, talking about the multi-stage attack that includes the Java exploit.
Songlyrics.com, which provides lyrics for tracks by the likes of Lady Gaga, Rihanna, Usher and Miley Cyrus, was apparently compromised by hackers, who added the redirecting IFRAME to the site, said Thompson. Emails to the site's administrator have gone unanswered, he added.
Windows users running Microsoft's Internet Explorer (IE) and Mozilla's Firefox are at risk if they have the Java browser plug-in installed. "Chrome seems to be safe, but that's not guaranteed," Thompson said.
That hackers quickly jumped on the Java bug didn't shock him. "The code involved is really simple, and that makes it easy to copy, so it's not surprising that just five days later, we're detecting that code," Thompson said, referring to the attack code Ormandy published on the mailing list. He also figures that others will rapidly follow suit. "It's so easy to use and copy that I would expect that it'll be in the [exploit tool]kits in a few days."
Although Ormandy reported the flaw to Sun - now part of Oracle - he said the company declined to rush out a patch. "They informed me they do not consider this vulnerability to be of high enough priority to break their quarterly patch cycle," Ormandy wrote on the mailing list. "I explained [to them] that I did not agree, and intended to publish advice to temporarily disable the affected control until a solution is available."
Oracle patched Java last week; its next regularly-scheduled update is slated for July.
Oracle did not reply to a request seeking comment on the vulnerability, or to questions about its patching plans now that Ormandy's exploit is being used by hackers. Songlyrics.com also did not respond to emailed questions from Computerworld.
"This will soon be everywhere, so Sun will need to issue an out-of-band patch," bet Thompson.
Until Oracle patches the problem, or if it refuses to address the flaw, users can protect themselves by applying the IE and Firefox workarounds that Ormandy offered last week on Full Disclosure. The SANS Institute's Internet Storm Center has reposted Ormandy's workarounds .