Lucian Constantin
CSO Senior Writer

Java installer flaw shows why you should clear your Downloads folder

news
Feb 8, 20163 mins

Older versions of the Java installer were vulnerable to binary planting in the Downloads folder

Java logo browser
Credit: Peter Sayer/IDGNS

On most computers, the default download folder quickly becomes a repository of old and unorganized files that were opened once and then forgotten about. A recently fixed flaw in the Java installer highlights why keeping this folder clean is important.

On Friday, Oracle published a security advisory recommending that users delete all the Java installers they might have laying around on their computers and use new ones for versions 6u113, 7u97, 8u73, or later.

The reason is that older Java installers are designed to look for and automatically load a number of specifically named DLL (Dynamic Link Library) files from the current directory. In the case of Java installers downloaded from the Web, the current directory is typically the computer’s default download folder.

If an attacker manages to place a specifically named malicious DLL into a computer’s “Downloads” folder, that file will be executed when the user tries to install Java for the first time or when he manually updates an existing Java installation by downloading and running a new installer.

“Though considered relatively complex to exploit, this vulnerability may result, if successfully exploited, in a complete compromise of the unsuspecting user’s system,” said Eric Maurice, Oracle’s software security assurance director, in a blog post.

This attack technique is called binary planting and has been known for a while. Over the past several years many software installers have been found to be vulnerable to it.

“If you launch Process Monitor and observe activities in the Downloads folder when any installer is launched, you will find a long series of attempts to load various DLLs,” researchers from Acros Security said in a blog post back in Feb. 2012. “Not surprising: this is how library loading works (first trying to find DLLs in the same folder as EXE), and in most cases it would not be a security problem as most folders hosting your EXEs are not attacker-writable. However, the Downloads folder is — to some extent, anyway.”

Some browsers are configured to automatically download files, even if they don’t execute them. Furthermore, clearing the download list from browsers only empties the download history. It does not actually remove the downloaded files.

It’s not hard to imagine a sort of carpet bombing attack where a malicious or infected website drops specifically named DLL files on users’ computers on the chance that a small percentage of them will later be executed by vulnerable installers. To avoid something like this users should regularly clean the Downloads folder themselves.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author