Risk
2/20/2013
08:49 AM
50%
50%

Oracle, Apple Issue Java Security Patches

Oracle updates Java 7 and issues the final-ever public update for Java 6, while Apple releases its own Java 6 update for OS X users.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Oracle Tuesday released new emergency patches for Java to fix flaws that are being actively exploited via in-the-wild attacks.

The five new fixes come in the form of Java 7 update 15 and Java 6 update 41. "Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU [critical patch update] fixes as soon as possible," according to the company's release notes.

Oracle said that the Tuesday update comprises its regularly scheduled quarterly critical patch release. While Oracle released an emergency Java update on February 1 that fixed 50 different bugs -- some of which could be used to remotely compromise a vulnerable system -- Oracle said there wasn't time to include all of its February bug fixes in that update. Oracle had also issued a January Java update to fix a zero-day vulnerability being actively exploited by at least four crimeware toolkits.

[ Why do the bad guys do it? Read Cybercrime 2.0: It's All About The Money. ]

Any Java users who didn't install previous updates need now only install the Tuesday release. "Critical Patch Updates for Java SE are cumulative. As a result, organizations that may not have applied the February 1st release will be able to apply the updated Critical Patch Update when it is published, and will then gain the benefit of all previously released Java SE fixes," said Eric Maurice, director of Oracle software security assurance, in a security bulletin. "As usual, desktop users will be able to install this new version from java.com or through the Java auto-update."

According to Oracle, this week's release of Java 6 update 41 is the final public version of Java 6 that it will release, although customers who have a Java 6-related support contract with Oracle may still see updates. "Previously available versions of JDK 6 will remain available to the public through the Java Archive for debugging and testing purposes but Oracle no longer recommends using those in production," according to a note published last year by Henrik Stahl, who's senior director of product management in the Java Platform Group at Oracle.

Oracle's next Java 7 security updates are due in two months. "Note also that Oracle has scheduled a Java SE Critical Patch Update for April 16, 2013, in addition to those previously scheduled in June and October of 2013 and in January of 2014," according to Oracle's security bulletin. "This additional distribution will be used to further accelerate Java security fixes to Java users."

In other Java security news, Apple Tuesday released an update that patches 30 Java flaws in the version of Java 6 that Apple maintains for Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 and later, OS X Lion Server v10.7 and later, and OS X Mountain Lion 10.8 and later.

"While Apple does maintain Java 6 for the Mac, Java 7 is maintained directly by Oracle and Mac users need to go to Oracle to install Java 7," said Wolfgang Kandek, CTO of Qualys, via email.

"On systems that have not already installed Java for OS X ... this update disables the Java SE 6 applet plug-in," according to Apple. "To use applets on a Web page, click on the region labeled 'Missing plug-in' to download the latest version of the Java applet plug-in from Oracle." Note that OS X automatically disables Java if it hasn't been used for 35 days.

Apple's Java update comes on the heels of the company's own systems being compromised by attackers, after employees visited a mobile application development website that had been infected and was used to exploit zero-day flaws present in Java browser plug-ins. Facebook and Twitter were also compromised using the same attack techniques.

Apple's new Java update is designed to spot the malware used by attackers, and "runs a malware removal tool that will remove the most common variants of malware," according to Apple's release notes, which said that "if malware is found, it presents a dialog notifying the user that malware was removed." If the update doesn't spot malware, however, users will see no notification.

Paul Ducklin, head of technology for Sophos in the Asia Pacific region, said in a blog post that from an information security standpoint, the best approach to Java remains to disable it whenever possible. "That stops dodgy Java applets from anywhere on the Web from playing havoc with your computer, whether you're running Windows, OS X, Linux or any other operating system on which Java is supported," he said.

"It's telling, perhaps, that Apple, with this most recent update, seems to have washed its hands permanently of browser-based Java," he said, referring to OS X users of Java 7 now having to obtain their Java updates directly from Oracle.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
2/21/2013 | 3:17:32 AM
re: Oracle, Apple Issue Java Security Patches
Dear Oracle,

For Pete's sake, can we please get it right? As an IT professional who's in charge of testing your little update packages (as well as a number of other huge, on-going projects), by the time I've fully vetted your update to make sure it works with all of my application portfolio, you're releasing yet another patch and the circle continues...

If yours wasn't the only supportable JVM available, I'd seriously be looking at something else.

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2382
Published: 2014-11-20
The DfDiskLo.sys driver in Faronics Deep Freeze Standard and Enterprise 8.10 and earlier allows local administrators to cause a denial of service (crash) and execute arbitrary code via a crafted IOCTL request that writes to arbitrary memory locations, related to the IofCallDriver function.

CVE-2014-3625
Published: 2014-11-20
Directory traversal vulnerability in Pivitol Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.

CVE-2014-8387
Published: 2014-11-20
cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users to execute arbitrary commands via shell metacharacters in the pinghost parameter to ping.cgi.

CVE-2014-8493
Published: 2014-11-20
ZTE ZXHN H108L with firmware 4.0.0d_ZRQ_GR4 allows remote attackers to modify the CWMP configuration via a crafted request to Forms/access_cwmp_1.

CVE-2014-8767
Published: 2014-11-20
Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?