JRE0001-J62K7 - Dialog enabling users to grant perms to execute signed content from an un-trusted auth is disabled. - 'Program Files (x86)'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from un-trusted sources may result in acquiring malware, and risks system modification, invasion of privacy, or denial of service.

Solution

Disable the 'Allow user to grant permissions to content from an un-trusted authority' feature.

Navigate to the 'deployment.properties' file for Java.

For 32 bit systems:
C:\Program Files\Java\jre6\lib\deployment.properties.

For 64 bit systems you must check both the 64 bit and the 32 bit files:
C:\Program Files\Java\jre6\lib\deployment.properties
C:\Program Files (x86)\Java\jre6\lib\deployment.properties

Add or update the key 'deployment.security.askgrantdialog.notinca' to be 'false'.

See Also

http://iase.disa.mil/stigs/app_security/app_sec/u_jre6_v1r4_stig.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CAT|II, Rule-ID|SV-43671r2_rule, STIG-ID|JRE0001-J62K7, Vuln-ID|V-32828

Plugin: Windows

Control ID: 286c45057eb80c99353797caedc97c95e9515d824e363f91a4a2efc118c96069