Oracle plugs 42 Java flaws in critical update
By Stewart Mitchell
Posted on 17 Apr 2013 at 11:06
Oracle is issuing 170 security patches – with 42 for Java alone – in a set of critical updates for its products.
In the update for Java, the company said users should take action as soon as possible, with 19 of the patches fixing issues that were given the company's highest risk factor of ten.
"This Critical Patch Update contains 42 new security fixes for Oracle Java SE - 39 of these vulnerabilities may be remotely exploitable without authentication," the company said. "They may be exploited over a network without the need for a username and password."
The company also cautioned anyone who had missed previous updates to check back through their records so see what needed updating.
It's a fight for the Java plugin's life. Either a lot of companies are going to turn these off, or they are going to have their confidence restored
Java has been the target of a series of attacks taking advantage of unpatched flaws, and while the latest set of fixes was viewed as a chance to rebuild confidence it's unclear whether too much damage.
Java attacks hit hundred of companies including Apple, Facebook and Twitter in February, and security experts warned computer users to ditch Java full stop in January.
"It was pretty embarrassing what happened with the Facebook attacks," IDC analyst Al Hilwa told Reuters.
"It's a fight for the Java plugin's life. Either a lot of companies are going to turn these off, or they are going to have their confidence restored."
As well as the 42 Java patches, the company also moved to shore up its other products with 128 patches, including three for its flagship Database product and 12 for its Fusion Middleware.
Apple has also released two security updates, one addressing a vulnerability in Java 6, which the company maintains on its Mac OS X platform.
The second patch mends a vulnerability in WebKit, the rendering engine in the Safari browser, but the fix has taken several weeks to surface since first being exploited.
"The WebKit vulnerability was also originally found in the Pwn2Own competition, but in this case in Google's Chrome browser," said Wolfgang Kandek, CTO at security firm Qualys. "Google fixed the vulnerability last month, the day after it was handed to them by the organisers of the competition."
"Google fixed the vulnerability last month, the day after it was handed to them by the organisers of the competition."
By Mark_Thompson on 17 Apr 2013
Apologies for being pedantic but ...
"Java has been the target of a series of attacks taking advantage of unpatched flaws, and while the latest set of fixes was viewed as a chance to rebuild confidence it's unclear whether too much damage."
Whether too much damage what????
I know I've been known to make a few grammatical mistakes now and then but I've seen a lot of these types of unfinished sentences in articles on PCPro over the last year and it's starting to irk me a little as it causes me to re-read things several times to make sure I'm not losing the plot. Does nobody proof read anymore?
By koshthetrekkie on 17 Apr 2013
- Google Glass: mugger bait, pub problem and other lessons learned from two dangerous weeks
- Twitter, please don't fiddle with my feed
- How Satya Nadella can get some pay-raise karma
- Windows 10: a step back to go forward
- Michael Dell: Cloud infrastructure is the roads, bridges and highways of the 21st century
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- How to sell more ebooks on Amazon
- 10 ways to make your business more secure
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office