[Vision2020] Oracle issues hot patch for zero day Java exploit

Kenneth Marcy kmmos1 at frontier.com
Mon Jan 14 08:46:58 PST 2013


Here is some technology news you can use if your computer system has a 
Java installation installed:

Oracle Corp. released an emergency update to its Java software for 
surfing the Web on Sunday, but security experts said the update fails to 
protect PCs from attack by hackers intent on committing cyber crimes.

*http://tinyurl.com/ayw8wdj *

ORACLE'S UPDATE

Oracle said on its security blog on Sunday that its update fixed two 
vulnerabilities in the version of Java 7 for Web browsers.

It said that it also switched Java's security settings to "high" by 
default, making it more difficult for suspicious programs to run on a 
personal computer without the knowledge of the user.

Java is a computer language that enables programmers to write software 
utilizing just one set of code that will run on virtually any type of 
computer, including ones that use Microsoft Corp's Windows, Apple Inc's 
OS X and Linux, an operating system widely employed by corporations.


London-based Incisive Media, online publishers of the Inquirer, had this 
to report on the subject:

http://www.theinquirer.net/inquirer/news/2236028/oracle-issues-hot-patch-for-zero-day-java-exploit 


*ENTERPRISE VENDOR* Oracle has released a patch for the zero day Java 
exploit that we reported on last week.

Then the insecurity firms were advising people to load their virtual 
shotguns and get in their security basements to avoid terrible assaults. 
Millions of computer users, regardless of what operating systems they 
use, would be affected and it would happen when they were using the 
internet.

Not disabling Java at that time 
<http://www.theinquirer.net/inquirer/news/2235878/security-vendors-warn-users-to-disable-java-after-zero-day-exploit-is-found>, 
we gather, was the equivalent of kissing a black rat, in London, during 
the plague. Fret no more though, as Oracle has issued the patch we have 
all been waiting for and his fixed Java.

Java 7 Update 11 
<http://www.oracle.com/technetwork/java/javase/7u11-relnotes-1896856.html>, 
which is available now, is the sticking plaster that patches the 
vulnerability. In short, it means that the "user is always warned before 
any unsigned application is run to prevent silent exploitation". It is 
recommended that you apply it.

"It's nice that Oracle fixed this vulnerability so quickly," said 
security expert Brian Krebs 
<http://krebsonsecurity.com/2013/01/oracle-ships-critical-security-update-for-java/>, 
"but I'll continue to advise readers to junk this program altogether 
unless they have a specific need for it."

Krebs said that Oracle has already tried to fix the same flaw, but 
failed, adding that malware writers are "constantly finding new zero-day 
vulnerabilities in Java".

He added that it would not surprise him if the same zero day situation 
were to "repeat itself in a month or so". µ

The Inquirer <http://s.tt/1yp7x> (http://s.tt/1yp7x)


So, basically, the situation is as it was reported four months ago by 
Information Week:

Oracle needs to fix holes faster, say some security experts. Leave Java 
disabled for now, because Oracle's emergency patch is insufficient.

http://www.informationweek.com/security/attacks/java-still-not-safe-security-experts-say/240006876 



Ken
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.fsr.com/pipermail/vision2020/attachments/20130114/e1f752ff/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: via.png
Type: image/png
Size: 277 bytes
Desc: not available
URL: <http://mailman.fsr.com/pipermail/vision2020/attachments/20130114/e1f752ff/attachment.png>


More information about the Vision2020 mailing list