Oracle rushes patch to quash critical Java bugs
Researcher stands by accusation that Oracle should have fixed one of the flaws last fall
Computerworld - Oracle on Sunday issued an emergency Java update to patch two critical vulnerabilities, including one that had been exploited in ongoing and accelerating attacks.
Also yesterday, a researcher noted for uncovering scores of Java bugs maintained that Oracle should have fixed that flaw last year.
The "out-of-band" update patched a pair of vulnerabilities -- identified as CVE-2013-0422 and CVE-2012-3174 -- with Java 7 Update 11.
The decision to release an emergency security update outside Oracle's normal schedule -- the first time the company has done so since August 2012 -- was triggered by confirmation last week that several notorious cybercrime kits were exploiting a "zero-day," or unpatched vulnerability in Java.
Pressure increased on Oracle Thursday when the U.S. Computer Emergency Readiness Team (US-CERT), part of the U.S. Department of Homeland Security (DHS), urged users to disable Java in their Web browsers.
Some browser makers didn't wait but took matters into their own hands. On Friday, Mozilla added Java 7 to its "Click to Play" blacklist, meaning that users had to explicitly agree to run the Java plug-in inside Firefox. Mozilla debuted Click to Play in Firefox 17, which launched in last November.
Oracle was clear to customers that they needed to update Java 7 immediately.
"Due to the severity of these vulnerabilities, the public disclosure of technical details and the reported exploitation of CVE-2013-0422 'in the wild,' Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible," the company's alert read.
In a Sunday blog post, Eric Maurice, the director of Oracle's software security assurance group, acknowledged that crimeware kits were leveraging one or more of the bugs. "Some exploits are available in hacking tools," Maurice said.
Some confusion still surrounded the Java bugs, however.
While Oracle and others -- including US-CERT and antivirus company Symantec -- have said the vulnerabilities affected only Java 7, others have rebutted that claim. Immunity Inc.'s analysis (download PDF), for example, concluded that at least one of the bugs leveraged in current exploits -- by all accounts, the attack code relied on two vulnerabilities -- was also present in some versions of Java 6, the edition set for retirement next month.
And Adam Gowdiak, founder and CEO of Polish security firm Security Explorations, who has dug up numerous Java vulnerabilities and reported them to Oracle, said on Sunday that he stood by his earlier accusation that Oracle had been sloppy with its patching.
According to Gowdiak, CVE-2013-0422 should have been patched last fall, after he told Oracle of a bug in the same section of code. Oracle released a security update in October that patched the vulnerability Gowdiak reported.
- Feds declare big win over Cryptolocker ransomware
- Hackers hit more businesses through remote access accounts
- P.F. Chang's post-breach move to manual processing is telling
- Microsoft withholds monster IE update from Windows 8.1 dawdlers
- In baffling move, TrueCrypt open-source crypto project shuts down
- 'Oleg Pliss' hack makes for a perfect teachable IT moment
- Give IE the heave-ho until Microsoft patches zero-day
- Hackers find first post-retirement Windows XP-related vulnerability
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt. All Malware and Vulnerabilities White Papers | Webcasts