On Thursday, Oracle released a rare out-of-cycle patch to address recently disclosed flaws in Java 7 that put Internet users around the world at risk, a move that many experts were concerned the software giant would not make, given its poor track record for developing timely security patches.
The main fix was to address CVE-2012-4681, a vulnerability that was been found to be exploited in targeted attacks over the past few weeks, and event eventually worked into the popular Black Hole Exploit Kit.
“This Security Alert contains 3 new security vulnerability fixes and 1 new security-in-depth fix for Oracle Java SE. The three vulnerabilities may be remotely exploitable without authentication,” Oracle said in advisory.
“Due to the severity of these vulnerabilities, the public disclosure of technical details and the reported exploitation of CVE-2012-4681 “in the wild,” Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.”
Security researchers from FireEye discovered the Java problem late last week, and after testing confirmed that it was a zero-day flaw. Systems running Windows, Mac OS X, or Linux, with JRE 1.7 Update 0 though 6 installed for Firefox, Safari, or Internet Explorer (and Chrome on XP), are vulnerable.
Days later, code to exploit the flaw was added to the Blackhole Exploit Kit, and Metasploit. In addition, it was reveled that Oracle was initially told about the problems in April.
While many experts felt that this issue would remain for some time, Oracle didn’t have much of a choice if they wanted to avert a major PR disaster that was already emerging, as the flaw made headlines around the world and certainly recieved more media attention than most previous security flaws, especially after it was learned that Oracle was told about the bug back in April.
Still, while a proper fix is exactly what was needed, don’t underestimate the risks posed by Java.
“This vulnerability is bad news, at least for those of us trying to avoid phishing and drive-by browsing attacks. The vulnerability is caused by a logic bug that allows an applet to grant itself full privileges. Unfortunately, this type of vulnerability isn’t new,” wrote Art Manion on the US-CERT blog.
“Vulnerabilities exploited with Java applets are a great way to bypass browser and OS security restrictions. Attackers know this, as shown by the prevalence of Java exploits in attacker toolkits.”
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
