[LINK] Security problems with Java in browsers

Nicholas English nik.english at gmail.com
Tue Sep 18 05:07:45 AEST 2012


Yep, understood that about the 'uggin' :)
and yes Wimba LiveClassroom is an applet run from the browser. You see the
same in Elluminate.

I'd be guessing but the desktop sharing in both are probably pulling on the
VNC architecture. Better minds than mine will know ;)

Elluminate and Wimba are probably in the top five university platforms so
that's a lot potential targets and some rich institutional pickings for
malware. :(

Nicholas English



Sent from a phone

On 17/09/2012, at 10:41 PM, Fernando Cassia <fcassia at gmail.com> wrote:



On Mon, Sep 17, 2012 at 3:15 PM, Nicholas English <nik.english at gmail.com>wrote:

>
> Examples include the stated Cloud enabled enterprise apps.


btw: the vulnerable component was the Java browser plug-in, not the Java
virtual machine (JRE). For server-side apps, there´s no issue at all (same
with desktop Java apps, like Jitsi), if you disable the plug-in in the
browser, either browser-wide (prefbar) or on a per-site basis (NoScript).



> But... more
> vulnerable are online learners needing to access VirtualClassrooms
> such as the Blackboard tools, many which are Java dependent.


Never heard of this one. Is this like a remote VNC session delieved via
Java applet?

Greetings,
FC

-- 
During times of Universal Deceit, telling the truth becomes a revolutionary
act
Durante épocas de Engaño Universal, decir la verdad se convierte en un Acto
Revolucionario
- George Orwell



More information about the Link mailing list