JRE0010-J62K7- Dialog enabling users to grant perms to execute signed content from an un-trusted auth is locked. - 'Program Files (x86)'

Information

Java applets exist in both signed and unsigned forms. Although signed applets allow for authentication of the author in order to establish trust, even signed applets can potentially contain malware. Applet sources considered trusted will normally have their certificate information populated into the browser. This enables Java to validate applets against trusted sources automatically. Permitting users to grant execution permissions to Java applets signed by un-trusted authorities may result in malware executing on the system. This risks system confidentiality, integrity and availability. Ensuring users cannot change settings contributes to a more consistent security profile.

Solution

Lock the 'Allow user to grant permissions to content from an un-trusted authority' feature.

Navigate to the 'deployment.properties' file for Java.

For 32 bit systems:
C:\Program Files\Java\jre6\lib\deployment.properties.

For 64 bit systems you must check both the 64 bit and the 32 bit files:
C:\Program Files\Java\jre6\lib\deployment.properties
C:\Program Files (x86)\Java\jre6\lib\deployment.properties

Add the key 'deployment.security.askgrantdialog.notinca.locked' to the deployment.properties file.

See Also

http://iase.disa.mil/stigs/app_security/app_sec/u_jre6_v1r4_stig.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CAT|II, Rule-ID|SV-43212r2_rule, STIG-ID|JRE0010-J62K7, Vuln-ID|V-32829

Plugin: Windows

Control ID: 129eed5efb93f51d0e41f382990a32ae9deea52b8b4646fe7549db491c3b8715