Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Data Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Oracle Pushes Out Emergency Java Fix
Oracle Pushes Out Emergency Java Fix

By Jennifer LeClaire
January 14, 2013 10:08AM

Bookmark and Share
Security analyst Paul Henry said the Java patch Oracle is issuing will solve the immediate problem by preventing this particular issue. "However, the underlying cause of the vulnerability is not being fixed with this patch and I'd guess it's a year or more before we see that problem truly solved," Henry said of the flaw in Java.
 

Related Topics

Java
Security
Oracle
Patch


The U.S. Department of Homeland Security last week made an urgent recommendation to computer users: disable Java software. The warning came at the discovery of a vulnerability that has the potential to allow criminal hackers to compromise millions of PCs. It's yet another zero-day exploit in Java.

Oracle on Sunday released Security Alert CVE-2012-0422 to address two vulnerabilities affecting Java in Web browsers. These vulnerabilities do not affect Java on servers, Java desktop applications, or embedded Java, according to Eric Maurice, software security assurance director at Oracle.

"These vulnerabilities, which only affect Oracle Java 7 versions, are both remotely exploitable without authentication and have received a CVSS Base Score of 10.0," Maurice said. "Oracle recommends that this Security Alert be applied as soon as possible because these issues may be exploited 'in the wild' and some exploits are available in various hacking tools."

Java Security "High"

Maurice said the exploit conditions for these vulnerabilities are the same: to be successfully exploited, an attacker needs to trick an unsuspecting user into browsing a malicious Web site.

Execution of the malicious applet within the browser of the unsuspecting users then allows the attacker to execute arbitrary code in the vulnerable system. These vulnerabilities are applicable only to Java in Web browsers because they are exploitable through malicious browser applets.

With this Security Alert, and in addition to the fixes for CVE-2013-0422 and CVE-2012-3174, Oracle is switching Java security settings to "high" by default. Note also that Java SE 7 Update 10 introduced the ability for users to easily disable Java in their browsers through the Java Control Panel.

"The high security setting requires users to expressly authorize the execution of applets which are either unsigned or are self-signed," Maurice said. "As a result, unsuspecting users visiting malicious Web sites will be notified before an applet is run and will gain the ability to deny the execution of the potentially malicious applet."

Root Cause Remains

Paul Henry, a forensic analyst at Lumension, said the patch Oracle is issuing will solve the immediate problem by preventing this particular issue.

"However, the underlying cause of the vulnerability is not being fixed with this patch and I'd guess it's a year or more before we see that problem truly solved, which will require some fundamental changes to Java," Henry told us.

"If you can, disable Java, but unfortunately, that's difficult to do. So many Internet applications require Java to function. The developers of these applications need to be looking at alternatives to Java. In the meantime, while we wait for that or a fundamental change to Java, you should apply this patch to buy some time and prevent this particular expression of the vulnerability from activating on your machine."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   Lessons from Verizon's Threat Report
2.   Verizon Report Exposes Cyberthreats
3.   Heartbleed Exploit Could Cost Millions
4.   Michaels: Nearly 3M Cards Breached
5.   Malware Targets Facebook Users


advertisement
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Don't Reset Passwords for Heartbleed?
Added caution needed to ensure security.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.