View Full Version : Java JRE updates/advisories
AplusWebMaster
2011-10-14, 14:50
FYI...
Java exploitation remains high ...
- https://blogs.technet.com/themes/blogs/generic/post.aspx?WeblogApp=mmpc&y=2011&m=10&d=13&WeblogPostName=sirv11-putting-vulnerability-exploitation-into-context&GroupKeys=
13 Oct 2011 - "... Most Frequent Exploits: ... Java exploitation remains high... The top four Java exploits are CVE-2010-0840, CVE-2008-5353, CVE-2010-0094, and CVE-2009-3867..."
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5353
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3867
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0094
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0840
Exploit Detections (charted)
> http://www.microsoft.com/security/portal/blog-images/BID043-111012-002.png
:fear::fear:
AplusWebMaster
2012-02-26, 20:22
FYI...
Java exploit code available for recently patched vuln ...
ZDI-12-039: Oracle Java Web Start java-vm-args Command Argument Injection Remote Code Execution
- http://atlas.arbor.net/briefs/index#-2068343742
Severity: High Severity
Feb 24, 2012 - "Exploit code is available for a recently patched Java vulnerability.
Analysis: Oracle patched a series of Java security issues in February and at least one of these issues now has publicly available exploit code, as published in the Metasploit framework. While Metasploit is intended for authorized penetration testing purposes, attackers have no such scruples and will happily leverage freshly published exploit code to develop their own and incorporate the exploit into their malware kits. Such exploits also pay off for the attackers who launch targeted attacks, as many targets do not patch in a timely manner."
Source: http://www.zerodayinitiative.com/advisories/ZDI-12-039/
___
- https://isc.sans.edu/diary.html?storyid=12838
Last Updated: 2012-03-25 17:04:16 UTC - "... In slight modification of Oracle's own words (https://www.java.com/en/download/faq/other_jreversions.xml): 'We highly recommend users remove all older versions of Java from your system. Keeping old and unsupported versions of Java on your system presents a serious security risk...' ..."
:fear::fear:
AplusWebMaster
2012-04-01, 20:23
FYI...
- http://www.oracle.com/technetwork/topics/security/alerts-086861.html
"... For Oracle Java SE Critical Patch Updates, the next three dates are:
12 June 2012
16 October 2012
19 February 2013 ..."
___
Critical Java hole being exploited on a large scale ...
- http://atlas.arbor.net/briefs/index#-1937641784
Severity: High Severity
Published: Wednesday, March 28, 2012 19:20
Java security vulnerability patched in February is now being used widely by criminals to install malware.
Analysis: Patch! Watch for outdated Java on the network as the presence of old Java User-Agents is often a sign that a system has been exploited and Java is now doing the attackers bidding, typically downloading something evil.
Source: http://h-online.com/-1485681
Update 29-03-12: "... Until an update is released that addresses the vulnerability, Mac OS X users can turn off Java. Users can disable Java via Java Preferences (Applications > Utilities > Java Preferences) by unchecking the installed version. Alternatively, users can disable Java in each of their browsers; in Apple's Safari browser, this can be done by unchecking the "Enable Java" and "Enable JavaScript" under the Security tab in Safari's Preferences..."
* http://www.h-online.com/open/news/item/Critical-Java-hole-being-exploited-on-a-large-scale-Update-1485681.html?view=zoom;zoom=2
___
- http://atlas.arbor.net/briefs/index#-51701177
Elevated Severity
March 30, 2012
Source: http://blog.eset.com/2012/03/30/blackhole-cve-2012-0507-and-carberp
Mac Flashback Exploiting Unpatched Java Vulnerability
- https://www.f-secure.com/weblog/archives/00002341.html
April 2, 2012
:fear:
AplusWebMaster
2012-06-12, 21:39
FYI...
Java v7u5 / v6u33 released
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
June 12, 2012
- http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
"... contains 14 new security fixes for Oracle Java SE. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
Risk Matrix
- http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html#AppendixJAVA
7 Update 4 and before, 6 Update 32 and before, 5 Update 35 and before, 1.4.2_37 and before. JavaFX 2.1 and before...
Verify:
>> https://www.java.com/en/download/installed.jsp?detect=jre&try=1
Java SE 7u5 JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1637588.html
Changes in 1.7.0_5
- http://www.oracle.com/technetwork/java/javase/7u5-relnotes-1653274.html
Java SE 6 Update 33 JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre6-downloads-1637595.html
Changes in 1.6.0_33
- http://www.oracle.com/technetwork/java/javase/6u33-relnotes-1653258.html
___
URGENT BULLETIN: All E-Business Suite End-Users...
- https://blogs.oracle.com/stevenChan/entry/bulletin_disable_jre_auto_update
Update: June 14, 2012 - "To ensure that Java Users remain on a secure version, Windows systems that rely on auto-update will be auto-updated from JRE 6 to JRE 7. Until EBS is certified with JRE 7, EBS users should -not- rely on the windows auto-update mechanism for their client machines and should -manually- keep the JRE up to date with the latest versions of 6 on an ongoing basis..."
- http://h-online.com/-1618753
15 June 2012
___
- http://www.securitytracker.com/id/1027153
CVE Reference: CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725, CVE-2012-1726
Jun 12 2012
Impact: Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via local system, User access via network
Version(s): 1.4.2_37 and prior, 5.0 Update 35 and prior, 6 Update 32 and prior, 7 Update 4 and prior...
- https://secunia.com/advisories/49472/
Release Date: 2012-06-13
Criticality level: Highly critical
Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information, DoS, System access
Where: From remote
Original Advisory: Oracle:
http://www.oracle.com/technetwork/topics/security/javacpujun2012verbose-1515971.html
:fear::fear:
AplusWebMaster
2012-08-15, 05:36
FYI...
Java v7u6 / v6u34 released
- http://www.oracle.com/us/corporate/press/1735645
August 14, 2012
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Java SE 7u6 JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1637588.html
Changes in 1.7.0_6
- http://www.oracle.com/technetwork/java/javase/7u6-relnotes-1729681.html
Bug fixes
- http://www.oracle.com/technetwork/java/javase/2col/7u6-bugfixes-1733378.html
Java SE 6 Update 34 JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre6-downloads-1637595.html
Changes in 1.6.0_34
- http://www.oracle.com/technetwork/java/javase/6u34-relnotes-1729733.html
Bug fixes
- http://www.oracle.com/technetwork/java/javase/2col/6u34-bugfixes-1733379.html
Java 6 EOL extended to February 2013
- https://blogs.oracle.com/henrik/entry/java_6_eol_h_h
Verify: https://www.java.com/en/download/installed.jsp?detect=jre&try=1
___
- http://h-online.com/-1667714
15 August 2012
___
- http://nakedsecurity.sophos.com/2012/08/15/oracle-updates-java-claims-full-and-timely-updates-for-apple-users/
Aug 15, 2012 - "... the latest Java version from Oracle is 7u6, also known as 1.7.0_6. If you don't intend to develop Java programs yourself, stick to the JRE. It's much smaller than the JDK, which reduces what's known in trendy-speak as your attack surface area. That's always a good thing. This new Java version includes a longish list of bugfixes*. These include: a few ominous-sounding ones with more than a whiff of vulnerability about them, such as 7166498 - JVM crash in ClassVerifier; the risky-sounding 7155051 - DNS provider may return incorrect results; and the intriguingly sticky-sounding 7178177 - Debug spewage when applets start up. With that in mind, I suggest you update as soon as practicable."
* http://www.oracle.com/technetwork/java/javase/2col/7u6-bugfixes-1733378.html
:fear:
AplusWebMaster
2012-08-30, 21:20
FYI...
New critical Java flaw claimed
- http://www.theregister.co.uk/2012/09/26/gowdiak_claims_new_java_flaw/
26 Sep 2012- "Oracle's Java is making a play to wrest back the title of world's leakiest code from Internet Explorer, after Polish researcher Adam Gowdiak claimed another critical flaw exists in the product. The -new- claim is stated on the Full Disclosure mailing list where Gowdiak writes that the newly-found flaw impacts “all latest versions of Oracle Java SE software” and that it allows “a complete Java security sandbox bypass in the environment of Java SE 5, 6 and 7.” That's apparently worse than previous exploits, as they only hit Java 7..."
- http://arstechnica.com/security/2012/09/yet-another-java-flaw-allows-complete-bypass-of-security-sandbox/
Sep 25, 2012
Consider disabling Java* in your browser until the next update**.
* https://krebsonsecurity.com/how-to-unplug-java-from-the-browser/
** https://isc.sans.edu/diary.html?storyid=14017
- http://www.oracle.com/technetwork/topics/security/alerts-086861.html
"For Oracle Java SE Critical Patch Updates, the next three dates are:
16 October 2012
19 February 2013
18 June 2013 ..."
___
Java v7u7 / v6u35 released
* http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-verbose-1835710.html
August 30, 2012
Risk Matrix
- http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html#AppendixJAVA
CVE-2012-4681, CVE-2012-1682, CVE-2012-3136, CVE-2012-0547
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Java SE 7u7 JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre7u7-downloads-1836441.html
Changes in 1.7.0_7
- http://www.oracle.com/technetwork/java/javase/7u7-relnotes-1835816.html
"... Bug fixes: This release contains a security-in-depth fix. For more information, see Oracle Security Alert for CVE-2012-4681*..."
___
Java SE 6 Update 35 JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre6u35-downloads-1836473.html
Changes in 1.6.0_35
- http://www.oracle.com/technetwork/java/javase/6u35-relnotes-1835788.html
"... Bug fixes: This release contains a security-in-depth fix. For more information, see Oracle Security Alert for CVE-2012-4681*..."
___
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4681 - 10.0 (HIGH)
Last revised: 09/01/2012 - "... as exploited in the wild in August 2012..."
:fear::fear:
AplusWebMaster
2012-10-16, 14:51
FYI...
- http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
"This Critical Patch Update Pre-Release Announcement provides advance information about the Oracle Java SE Critical Patch Update for October 2012, which will be released on Tuesday, October 16, 2012... This Critical Patch Update contains 30 new security fixes for Oracle Java SE. 29 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
:fear::fear:
AplusWebMaster
2012-10-16, 22:28
FYI...
Java SE Critical Patch Update Advisory - October 2012
- http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
Oct 16, 2012
Java JRE 7u9 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7u9-downloads-1859586.html
Oct 16, 2012
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u9-relnotes-1863279.html
Java JRE 6 Update 37
- http://www.oracle.com/technetwork/java/javase/downloads/jre6u37-downloads-1859589.html
Oct 16, 2012
Release Notes
- http://www.oracle.com/technetwork/java/javase/6u37-relnotes-1863283.html
Java - October 2012 Risk Matrices
- http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html#AppendixJAVA
"This Critical Patch Update contains 30 new security fixes for Oracle Java SE. 29 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
___
- http://atlas.arbor.net/briefs/index#1321617866
Severity: High Severity
October 17, 2012
Oracle releases Java security patches that should be applied as soon as possible.
Analysis: Given the damage that has been caused by malware infections and system intrusions caused by vulnerable versions of Java being exploited it is likely that the security holes patched herein will also be used by cyber-criminals, nation-state attackers and others in their quest to compromise systems and pursue a malicious agenda. Limiting the scope of browser-based Java to one specific browser that's only used on trusted applications and also wrapping Java on any Microsoft platform with a technology such as EMET to reduce the risk of future exploitation can help provide additional protection for this widely attacked software.
- http://www.securitytracker.com/id/1027672
CVE Reference: CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-3143, CVE-2012-3159, CVE-2012-3216, CVE-2012-4416, CVE-2012-5067, CVE-2012-5068, CVE-2012-5069, CVE-2012-5070, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5074, CVE-2012-5075, CVE-2012-5076, CVE-2012-5077, CVE-2012-5078, CVE-2012-5079, CVE-2012-5080, CVE-2012-5081, CVE-2012-5082, CVE-2012-5083, CVE-2012-5084, CVE-2012-5085, CVE-2012-5086, CVE-2012-5087, CVE-2012-5088, CVE-2012-5089
Oct 17 2012
Impact: Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Version(s): 1.4.2_38 and prior, 5.0 Update 36 and prior, 6 Update 35, 7 Update 7 and prior
Impact: A remote user can take full control of the target system.
A remote user can access and modify data on the target system.
A remote user can cause partial denial of service conditions on the target system.
Solution: The vendor has issued a fix, described in the October 2012 Critical Patch Update advisory.
The vendor's advisory is available at:
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
- https://secunia.com/advisories/50949/
Release Date: 2012-10-17
Criticality level: Highly critical
Impact: Manipulation of data, Exposure of sensitive information, DoS, System access
Where: From remote
... vulnerabilities are reported in the following products:
* JDK and JRE 7 Update 7 and earlier.
* JDK and JRE 6 Update 35 and earlier.
* JDK and JRE 5.0 Update 36 and earlier.
* SDK and JRE 1.4.2_38 and earlier.
* JavaFX 2.2 and earlier.
Solution: Apply updates.
Original Advisory: Oracle:
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
___
- http://javatester.org/
Oct 17, 2012 - "... not all known bugs were fixed..."
- http://blogs.computerworld.com/application-security/21173/ugly-side-latest-java-updates
Oct 18, 2012 -"... the ugly stuff. The biggest issue is that Oracle didn't patch all the known problems with Java. As a result, even these latest and greatest editions of Java remain vulnerable to a known critical flaw. Adam Gowdiak is the security researcher who found many of the recent flaws in Java. His last flaw became public knowledge on September 25th. Since the problem was exploitable on Java versions 5, 6 and 7, Gowdiak estimated that it put 1 billion users at risk. A couple security organizations, Heise and Kaspersky, have been in contact with Gowdiak about how well the latest versions of Java patch the flaws he discovered. Gowdiak told Heise Security "that a critical security hole that allows attackers to break out of the Java sandbox continues to exist in Java". He claims that Oracle told him that the just-released package of 30 bug fixes was "already in its final testing phase" when he reported the September 25th flaw. In other words, he was too late to the party. He told Kaspersky the same thing. The flaw that puts a billion users at risk won't be patched until February 19, 2013. This is not to suggest, in any way, ignoring the latest updates to Java. Just recognize that they make you safer (30 bugs were fixed) rather than safe..."
:fear::fear:
AplusWebMaster
2012-12-12, 05:39
FYI...
Java 7u10/6u38 released
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Dec 11, 2012
7u10 Downloads:
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
Bug Fixes - JDK 7u10
> http://www.oracle.com/technetwork/java/javase/2col/7u10-bugfixes-1881008.html
- http://www.oracle.com/technetwork/java/javase/7u10-relnotes-1880995.html
___
- http://h-online.com/-1770629
17 Dec 2012
> http://docs.oracle.com/javase/7/docs/technotes/guides/jweb/client-security.html
> http://docs.oracle.com/javase/7/docs/technotes/guides/jweb/jcp.html
- https://krebsonsecurity.com/2012/12/shocking-delay-in-fixing-adobe-shockwave-bug/
Dec 19, 2012 - "... There are bug fixes with these releases, but no official security updates. However, the Java 7 update does include some new functionality designed to make it easier to disable Java in the browser..."
___
6 Update 38 Downloads:
- http://www.oracle.com/technetwork/java/javase/downloads/jre6u38-downloads-1877409.html
Bug Fixes - JDK 6u38
- http://www.oracle.com/technetwork/java/javase/2col/6u38-bugfixes-1880999.html
- http://www.oracle.com/technetwork/java/javase/6u38-relnotes-1880997.html
- http://www.oracle.com/technetwork/java/javase/eol-135779.html
"... After February 2013, Oracle will no longer post updates of Java SE 6 to its public download sites. Existing Java SE 6 downloads already posted as of February 2013 will remain accessible in the Java Archive on Oracle Technology Network. Developers and end-users are encouraged to update to more recent Java SE versions..."
:fear:
AplusWebMaster
2013-01-10, 16:19
FYI...
Java 0-Day exploit ...
- https://krebsonsecurity.com/2013/01/zero-day-java-exploit-debuts-in-crimeware/
Jan 10, 2013 - "The hackers who maintain Blackhole and Nuclear Pack – competing crimeware products that are made to be stitched into hacked sites and use browser flaws to foist malware — say they’ve added a brand new exploit that attacks a previously unknown and currently unpatched security hole in Java... According to both crimeware authors, the vulnerability exists in all versions of Java 7, including the latest — Java 7 Update 10... if you have Java installed, it would be a very good idea to unplug Java from your browser, or uninstall this program entirely if you don’t need it...
Update: Alienvault Labs* say they have reproduced and verified the claims of a new Java zero-day that exploits a vulnerability in fully-patched versions of Java 7."
* http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/
Jan 10, 2013 - "... It seems both Blackhole and Nuclear Pack exploit kits are using this vulnerability in the wild..."
___
- http://www.kb.cert.org/vuls/id/625617
Last revised: 14 Jan 2013
Disabling Java in the Browser:
- http://www.java.com/en/download/help/disable_browser.xml
- https://www.us-cert.gov/cas/techalerts/TA13-010A.html
Last revised: 14 Jan 2013
> Uncheck this setting: https://www.java.com/en/img/download/enable_java.jpg
___
- https://secunia.com/advisories/51820/
Last Update: 2013-01-14
Criticality level: Extremely critical
Impact: System access
Where: From remote
Solution: Update to version 7 update 11.
- https://www.securelist.com/en/blog/208194070/Java_0day_Mass_Exploit_Distribution
"... There appears to be multiple ad networks redirecting to Blackhole sites, amplifying the mass exploitation problem*... Metasploit developers have added an exploit module targeting this vulnerability CVE-2013-0422..."
* https://www.securelist.com/en/images/pictures/klblog/208194077.PNG
- http://www.securitytracker.com/id/1027972
CVE Reference: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0422 - 10.0 (HIGH)
Updated: Jan 13 2013
Impact: Execution of arbitrary code via network, User access via network
Exploit Included: Yes
Version(s): 1.7 u10 and prior 1.7 versions
Solution: The vendor has issued a fix (7 Update 11)...
- http://blog.trendmicro.com/trendlabs-security-intelligence/java-zero-day-exploit-in-the-wild-spreading-ransomware/
Jan 10, 2013 - "... Currently, this exploit is being used by toolkits like the Blackhole Exploit Kit (BHEK) and the Cool Exploit Kit (CEK). CEK is the creation of the same author responsible for Blackhole Exploit Kit. It appears to be a high-end version of the more accessible BHEK. Zero-day exploits are first incorporated into CEK and only added into BHEK once they have been disclosed. It has been reported that CEK was being used to distribute ransomware, particularly Reveton variants..."
- https://www.symantec.com/security_response/threatconlearn.jsp
:fear::fear::mad:
AplusWebMaster
2013-01-14, 02:40
FYI...
Java v7u11 released - Download
- http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html
Jan 13, 2013
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u11-relnotes-1896856.html
"... This release contains fixes for security vulnerabilities. For more information, see Oracle Security Alert for CVE-2013-0422*..."
* http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html
> http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html#AppendixJAVA
2013-January 13
- https://blogs.oracle.com/security/entry/security_alert_for_cve_2013
Jan 13, 2013 - "... The vulnerabilities addressed with this Security Alert are CVE-2013-0422 and CVE-2012-3174. These vulnerabilities, which only affect Oracle Java 7 versions, are both remotely exploitable without authentication and have received a CVSS Base Score of 10.0. Oracle recommends that this Security Alert be applied as soon as possible because these issues may be exploited “in the wild” and some exploits are available in various hacking tools..."
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0422 - 10.0 (HIGH)
"... vulnerability in Oracle Java 7 before Update 11..."
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3174 - 10.0 (HIGH)
"... vulnerability in Oracle Java 7 before Update 11..."
:fear::fear:
AplusWebMaster
2013-01-16, 21:01
FYI...
New Java 0-day exploit - $5,000 per Buyer
- https://krebsonsecurity.com/2013/01/new-java-exploit-fetches-5000-per-buyer/
Jan 16, 2013 - "Less than 24 hours after Oracle patched a dangerous security hole in its Java software that was being used to seize control over Windows PCs, miscreants in the Underweb were already selling an exploit for a different and apparently still-unpatched zero-day vulnerability in Java... The hacker forum admin’s message... promised weaponized and source code versions of the exploit. This seller also said his Java 0day — in the latest version of Java (Java 7 Update 11) — was not yet part of any exploit kits, including the Cool Exploit Kit... this same thing happened not long after Oracle released a Java update in October; a few weeks later, a Java 0day was being sold to a few private users on this same Underweb forum..."
- http://www.nbcnews.com/technology/technolog/despite-java-update-security-experts-say-bugs-remain-1B7956548
"... Some security consultants are advising businesses to remove Java from the browsers of all employees except for those who absolutely need to use the technology for critical business purposes. HD Moore... said it could take two years for Oracle to fix all the security bugs that have currently been identified in the version of Java that is used for surfing the Web..."
:fear::fear:
AplusWebMaster
2013-01-19, 00:35
FYI...
Java 7u11 vulnerable
- http://seclists.org/fulldisclosure/2013/Jan/142
18 Jan 2013 - "... We have successfully confirmed that a complete Java security sandbox bypass can be still gained under the recent version of Java 7 Update 11 [1] (JRE version 1.7.0_11-b21)... two new security vulnerabilities (51 and 52) were spotted in a recent version of Java SE 7 code and they were reported to Oracle today [4] (along with a working Proof of Concept code)..."
- http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/
Jan 18, 2013 - "... researchers have confirmed that the latest version of Oracle's Java software framework is vulnerable to Web hacks that allow attackers to install malware on end users' computers... As Ars has advised in the past, readers who have no use for Java should consider removing program plug-ins from their browsers, or uninstalling Java altogether from their computer..."
How to uninstall: https://www.java.com/en/download/uninstall.jsp
- http://www.securitytracker.com/id/1028019
Jan 19 2013
Impact: Execution of arbitrary code via network, User access via network
Vendor Confirmed: Yes
Version(s): 7 Update 11; possibly prior versions
Description: Two vulnerabilities were reported in Oracle Java. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.
The vendor was notified on January 18, 2013...
Solution: No solution was available at the time of this entry...
- http://www.hotforsecurity.com/blog/police-ransomware-becomes-java-0-day-borne-5032.html
Jan 14, 2013 - "... Exploit prevalence – breakdown by country for the past three days"
> http://www.hotforsecurity.com/wp-content/uploads/2013/01/exploit-distribution.png
- https://blogs.technet.com/b/mmpc/archive/2013/01/20/a-technical-analysis-of-a-new-java-vulnerability-cve-2013-0422.aspx?Redirected=true
20 Jan 2013 - "... since the public disclosure happened a few days ago, the samples and telemetry are increasing drastically, almost catching up with previous major Java vulnerabilities (CVE-2012-4681, CVE-2012-5076). The one notable thing is that we've started seeing multi-exploit samples combining CVE-2013-0422 and CVE-2012-1723*... The strategy of this combined exploit is that by sending one exploit code, they can cover any vulnerable Java 6 installations (up to JRE 6u32) and vulnerable Java 7 installations (up to JRE 7u10) at one time. As for JRE 7, CVE-2012-1723 is only applicable up to JRE 7u4, they can abuse CVE-2013-0422** to cover JRE 7u5 to 7u10 for exploitation..."
* https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1723 - 10.0 (HIGH)
** https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0422 - 10.0 (HIGH)
- http://atlas.arbor.net/briefs/index#848588693
Oracle's Java Patch Shipped with Additional Vulnerabilities...
Elevated Severity
January 23, 2013
The latest version of Java did not fully address the most recent security issue, and other issues have been found.
Analysis: Java is a very hot attack target for some time, implicated in many attacks ranging from commodity cybercrime to targeted espionage attacks. Properly hardening and restricting Java is critical if an organization requires it's use. If java, and other plug-ins are not required for core functionality, they should be removed from controlled environments in order to reduce security risks. The general principle of hardening included reducing the attack surface by giving attackers less to attack...
- http://atlas.arbor.net/briefs/index#753048269
Severity: High Severity
January 28, 2013
Java: still problematic despite progress being made.
Analysis: Containing Java is important - restrict it to browsers that are only used for sites that must require it. Click-to-run techniques inside modern browsers can help reduce the attack surface. Additionally, Java User-Agents crossing the wire in a post-compromise scenario can be detected and action taken when such activity is unexpected. Sniffing the wire for older versions of Java is even more effective, as the chance of a compromise traffic is even higher.
Source: http://seclists.org/fulldisclosure/2013/Jan/241?
:sad: :fear::fear:
AplusWebMaster
2013-02-01, 22:26
FYI...
Java v7u13 released
- http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html
Feb 1, 2013
JRE 7u13
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
- https://www.java.com/en/download/manual.jsp
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u13-relnotes-1902884.html
This release contains fixes for security vulnerabilities. For more information, see Oracle Java SE Critical Patch Update Advisory*.
* http://www.oracle.com/technetwork/topics/security/javacpufeb2013verbose-1841196.html
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html#AppendixJAVA
- https://blogs.oracle.com/security/entry/february_2013_critical_patch_update
Feb 01, 2013 - "... contains fixes for -50- security vulnerabilities. 44 of these vulnerabilities only affect client deployment of Java..."
Oracle Java SE Critical Patch Update Advisory - February 2013
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
Note: The original Critical Patch Update for Java SE – February 2013 was scheduled to be released on February 19th, but Oracle decided to accelerate the release of this Critical Patch Update because active exploitation “in the wild” of one of the vulnerabilities affecting the Java Runtime Environment (JRE) in desktop browsers, was addressed with this Critical Patch Update...
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1489 - 10.0 (HIGH)
___
JRE 6u39
- http://www.oracle.com/technetwork/java/javase/downloads/jre6downloads-1902815.html
- http://www.oracle.com/technetwork/java/javase/6u39-relnotes-1902886.html
___
- http://www.securitytracker.com/id/1028071
CVE Reference: CVE-2012-1541, CVE-2012-1543, CVE-2012-3213, CVE-2012-3342, CVE-2012-4301, CVE-2012-4305, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0436, CVE-2013-0437, CVE-2013-0438, CVE-2013-0439, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0447, CVE-2013-0448, CVE-2013-0449, CVE-2013-0450, CVE-2013-1472, CVE-2013-1473, CVE-2013-1474, CVE-2013-1475, CVE-2013-1476, CVE-2013-1477, CVE-2013-1478, CVE-2013-1479, CVE-2013-1480, CVE-2013-1481, CVE-2013-1482, CVE-2013-1483, CVE-2013-1489
Feb 1 2013
Impact: Denial of service via network, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 5.0 Update 38 and prior; 6 Update 38 and prior; 7 Update 11 and prior...
Solution: The vendor has issued a fix as part of the Oracle Java SE Critical Patch Update Advisory for February 2013. The vendor's advisory is available at:
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html
- http://www.kb.cert.org/vuls/id/858729
Last Updated: 05 Feb 2013
___
- https://blogs.oracle.com/security/entry/updates_to_february_2013_critical#
Update Feb 08, 2013: "... As a result of the accelerated release of the Critical Patch Update, Oracle did not include a small number of fixes initially intended for inclusion in the February 2013 Critical Patch Update for Java SE. Oracle is therefore planning to release an updated version of the February 2013 Critical Patch Update on the initially scheduled date. This updated February 2013 Critical Patch Update will be published on February 19th..."
:fear::fear:
AplusWebMaster
2013-02-19, 22:18
FYI...
- https://secure.dslreports.com/forum/r28039102-
2013-02-23 - "With the last 2 Java updates on my XP box (7_13 & 7_15), I received the offer of a McAfee Security Scan which I declined. The same updates on my Vista box offered the installation of the Ask.com toolbar which I also declined..."
- https://encrypted.google.com/
Tag-along software installs
"... About 35,500,000 results..." < 3.15.2013
___
IBM Java Multiple Vulnerabilities
- https://secunia.com/advisories/52308/
Release Date: 2013-03-01
Criticality level: Highly critical
Impact: Privilege escalation, DoS, System access, Manipulation of data, Exposure of sensitive information
Where: From remote...
Original Advisory: http://www.ibm.com/developerworks/java/jdk/alerts/
___
Java 7u15 released - JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
Feb 19, 2013
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u15-relnotes-1907738.html
JDK
- http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html
Java v7 Update 15
- https://www.java.com/en/download/manual.jsp
Risk Matrix
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html#AppendixJAVA
- https://blogs.oracle.com/security/entry/updated_february_2013_critical_patch
Feb 19, 2013
___
Java JRE v6 Update 41
- http://www.oracle.com/technetwork/java/javase/downloads/jre6downloads-1902815.html
___
- http://www.securitytracker.com/id/1028155
CVE Reference: CVE-2013-1484, CVE-2013-1485, CVE-2013-1486, CVE-2013-1487
Feb 19 2013
Impact: Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 1.4.2_41 and prior, 5.0 Update 39 and prior, 6 Update 39, 7 Update 13 and prior
:fear:
AplusWebMaster
2013-02-25, 19:34
FYI...
Two new Java 0-day bugs
- https://www.computerworld.com/s/article/9237124/Researcher_unearths_two_new_Java_zero_day_bugs
Feb 25, 2013 - "... Oracle shipped Java 7 Update 15 (7u15) on Feb. 19, bundling patches first released in a Feb. 1 emergency update with fixes for five more vulnerabilities. The -new- vulnerabilities affect only Java 7... Java 6, which Oracle has officially retired from support, does not contain the bugs... security experts today again urged users to disable or even uninstall Java..."
- http://nakedsecurity.sophos.com/2013/02/25/zero-day-vulnerabilities-java/
Feb 25, 2013 - "... the flaws could be exploited to completely bypass Java's security sandbox and infect computers..."
- http://arstechnica.com/security/2013/02/javas-latest-security-problems-new-flaw-identified-old-one-attacked/
Feb 25, 2013 - "... users who don't need Java should consider uninstalling it, or at least the Java plug-ins used to run Java content in Web browsers..."
___
- http://atlas.arbor.net/briefs/index#230624733
Elevated Severity
Feb 26, 2013
More security troubles for Java.
Analysis: Restricting Java is an important step in protecting your enterprise. Monitoring it's use on the network can indicate exploitation calling back to a malware Command & Control server. Patches are being issued, however it's wise to restrict Java as much as possible and provide additional hardening if it must be used..."
- http://h-online.com/-1810990
26 Feb 2013
:sad::fear::fear:
AplusWebMaster
2013-03-01, 15:46
FYI...
Current Java new attack...
- http://h-online.com/-1814716
01 March 2013 - "... FireEye reports* that cyber criminals are exploiting previously unknown vulnerabilities in the -current- Java versions to deploy malware... The hole is found -both- in Java version 7 update 15 and in version 6 update 41...
To protect themselves, users can completely uninstall Java or at least disable it in their browser..."
* http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html
- https://www.virustotal.com/en/file/c5bdf8572d3fe3c110e3c56ebd2433169ea968818ec811faf72b322d9bcf94b8/analysis/
File name: Inst.exe
Detection ratio: 24/46
Analysis date: 2013-03-01
New Java 0-Day Attack Echoes Bit9 Breach
- https://krebsonsecurity.com/2013/03/new-java-0-day-attack-echoes-bit9-breach/
Mar 1, 2013 - 110.173.55.187
- https://secunia.com/advisories/52451/
Release Date: 2013-03-02
Criticality level: Extremely critical
Impact: System access
Where: From remote
Solution Status: Unpatched
CVE Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493
... vulnerability is reported in version 7 update 15 and version 6 update 41. Other versions may also be affected.
Solution: No official solution is currently available.
Provided and/or discovered by: Reported as a 0-day.
:mad:
AplusWebMaster
2013-03-05, 00:34
FYI...
There are a dozen known flaws in Java ...
- http://blogs.computerworld.com/malware-and-vulnerabilities/21883/there-are-dozen-known-flaws-java
March 10, 2013 - "The last time Oracle released a new version of Java was less than a week ago (March 4th). Yet, there are already a dozen known, un-patched bugs in this latest release (Java 7 update 17)..."
___
Java JRE 7u17 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
Mar 4, 2013
- https://blogs.oracle.com/security/entry/security_alert_cve_2013_1493
Mar 4, 2013 - "Today Oracle released Security Alert CVE-2013-1493 to address two vulnerabilities affecting Java running in web browsers (CVE-2013-1493 and CVE-2013-0809). One of these vulnerabilities (CVE-2013-1493) has recently been reported as being actively exploited by attackers..."
- http://www.oracle.com/technetwork/java/javase/7u17-relnotes-1915289.html
Risk Matrix
- http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html#AppendixJAVA
JDK 7u17
- http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html
___
Java 6 Update 43
- http://www.oracle.com/technetwork/java/javase/downloads/jre6downloads-1902815.html
- https://secunia.com/advisories/52451/
Last Update: 2013-03-06
Criticality level: Extremely critical
Impact: System access
Where: From remote...
CVE Reference(s):
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0809 - 10.0 (HIGH)
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1493 - 10.0 (HIGH)
Solution: http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html#AppendixJAVA
___
- http://seclists.org/fulldisclosure/2013/Mar/38
Mar 4, 2013 - "... 5 -new- security issues were discovered in Java SE 7..."
:fear::fear:
AplusWebMaster
2013-04-16, 05:43
FYI...
Oracle Java SE Critical Patch Update Pre-Release Announcement - April 2013
- http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html
Apr 15, 2013 - "This Critical Patch Update Pre-Release Announcement provides advance information about the Oracle Java SE Critical Patch Update for April 2013, which will be released on Tuesday, April 16, 2013... this Critical Patch Update contains -42- new security vulnerability fixes..."
:fear:
AplusWebMaster
2013-04-16, 23:23
FYI...
- http://www.symantec.com/connect/blogs/java-exploit-cve-2013-2423-coverage
Updated: 26 Apr 2013 - "... this vulnerability is now seen as a high priority... Please be aware of -malware- that masquerades as software updates and patches - only download the patch from the official website."
Current version always shown here:
- https://www.java.com/en/download/manual.jsp
___
Java JRE 7u21
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
April 16, 2013
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u21-relnotes-1932873.html
- https://blogs.oracle.com/security/entry/april_2013_critical_patch_update1
Apr 16, 2013
Oracle Java SE Critical Patch Update Advisory - April 2013
- http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html#AppendixJAVA
April 16, 2013 - "This Critical Patch Update contains 42 new security fixes for Oracle Java SE. 39 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
Recommended Version 7 Update 21
- https://www.java.com/en/download/manual.jsp
- https://krebsonsecurity.com/2013/04/java-update-plugs-42-security-holes/
April 16, 2013 - "... contains 42 new security fixes for Oracle Java SE. A majority of these flaws are browse-to–a-hacked-site-and-get-infected vulnerabilities..."
Java JRE 6 Update 45
- http://www.oracle.com/technetwork/java/javase/downloads/jre6downloads-1902815.html
___
Java 7 Update 21 is available - Watch for Behaviour Changes
- https://isc.sans.edu/diary.html?storyid=15620
2013-04-16 - "... Oracle has significantly changed how Java runs with this version. Java now requires code signing, and will pop up brightly coloured dialogue boxes if your code is not signed. They now alert on unsigned, signed-but-expired and self-signed certificates. We'll even need to click "OK" when we try to download and execute signed and trusted Java... graphics you can expect to see once you update are:
> https://isc.sans.edu/diaryimages/images/expired_cert.jpg
> https://isc.sans.edu/diaryimages/images/unsigned_cert.jpg
Full details on the new run policy can be found here ==>
- https://www.java.com/en/download/help/appsecuritydialogs.xml
And more information can be found here ==>
- http://www.oracle.com/technetwork/java/javase/tech/java-code-signing-1915323.html "
Dangerous defaults let certificates stay unchecked.
- http://www.h-online.com/security/news/item/Java-7-Update-21-closes-security-holes-and-restricts-applets-1843558.html?view=zoom;zoom=2
17 April 2013
___
- http://www.securitytracker.com/id/1028434
CVE Reference: CVE-2013-0401, CVE-2013-0402, CVE-2013-1488, CVE-2013-1491, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1558, CVE-2013-1561, CVE-2013-1563, CVE-2013-1564, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2414, CVE-2013-2415, CVE-2013-2416, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2425, CVE-2013-2426, CVE-2013-2427, CVE-2013-2428, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2432, CVE-2013-2433, CVE-2013-2434, CVE-2013-2435, CVE-2013-2436, CVE-2013-2438, CVE-2013-2439, CVE-2013-2440
Apr 16 2013
Impact: Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 5.0 Update 41, 6 Update 43, 7 Update 17; and prior versions...
Solution: The vendor has issued a fix (6 Update 45, 7 Update 21)...
___
- http://www.f-secure.com/weblog/archives/00002544.html
April 23, 2013 - "A few days after Oracle released a critical patch, CVE-2013-2423* is found to (have) already been exploited. Upon checking the history, the exploitation seems to have begun on April 21st and is still actively happening... the Metasploit module was published on the 20th... the exploit was seen in the wild the day after..."
* https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2423
:fear:
AplusWebMaster
2013-06-04, 17:01
FYI...
Java users at risk ...
- http://community.websense.com/blogs/securitylabs/archive/2013/06/04/majority-of-users-still-vulnerable-to-java-exploits.aspx
4 Jun 2013 - "... collecting telemetry... to provide insight into usage of the most recent version of Java... almost 93% of users are still not patched to the most recent version of Java. This leaves the majority of users still vulnerable to the dangers of exploit code already in use in the wild... So 1 month after release, the remaining 92.8% of users remain vulnerable to at least one exploit in the wild... the April 2013 Java Critical Patch Update contained 42 new security fixes, of which 39 may be remotely exploitable without authentication. We saw that on April 20, 2013, to illustrate the danger of just one of these 39 remote execution vulnerabilities, Metasploit published a module to exploit a vulnerability in CVE-2013-2423*. We have observed this particular exploit code incorporated into exploit kits and used in the wild..."
* https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2423
Java JRE 7u21
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
April 16, 2013
Recommended Version 7 Update 21
- https://www.java.com/en/download/manual.jsp
- https://krebsonsecurity.com/2013/04/java-update-plugs-42-security-holes/
April 16, 2013 - "... contains 42 new security fixes for Oracle Java SE. A majority of these flaws are browse-to–a-hacked-site-and-get-infected vulnerabilities..."
:fear::fear:
AplusWebMaster
2013-06-18, 22:26
FYI...
Java JRE 7u25
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
June 18, 2013
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u25-relnotes-1955741.html
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
"... This Critical Patch Update contains 40 new security fixes across Java SE products of which 4 are applicable to server deployments of Java..."
Java SE Risk Matrix
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html#AppendixJAVA
- http://www.oracle.com/technetwork/topics/security/javacpujun2013verbose-1899853.html
- https://blogs.oracle.com/security/entry/june_2013_critical_patch_update
Jun 18, 2013
Recommended Version 7 Update 25
- https://www.java.com/en/download/manual.jsp
___
- http://www.securitytracker.com/id/1028679
CVE Reference: CVE-2013-1500, CVE-2013-1571, CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2437, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449, CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459, CVE-2013-2460, CVE-2013-2461, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465, CVE-2013-2466, CVE-2013-2467, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, CVE-2013-2473, CVE-2013-3743, CVE-2013-3744
Jun 18 2013
Impact: Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, Root access via local system, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 5.0 Update 45, 6 Update 45, 7 Update 21; and prior versions ...
Solution: The vendor has issued a fix (7 Update 25).
- https://secunia.com/advisories/53846/
Release Date: 2013-06-19
Criticality level: Highly critical
Impact: Spoofing, Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access
Where: From remote
... vulnerabilities are reported in the following products:
* JDK and JRE 7 Update 21 and prior
* JDK and JRE 6 Update 45 and prior
* JDK and JRE 5 Update 45 and prior
Solution: Apply updates...
___
Less Than 1 Percent Of Enterprises Run Newest Version Of Java
Most businesses have multiple, outdated versions of the app on their endpoints, new report finds
- http://www.darkreading.com/vulnerability/write-once-pwn-anywhere-less-than-1-per/240158496?printer_friendly=this-page
July 18, 2013 - "... More than 90 percent of organizations are running a version of Java that's at least five years old, and 82 percent of endpoints run Java version 6, according to a new report by Bit9 that investigated Java installations in the enterprise. There are an average of 1.6 versions of Java on every endpoint, and nearly half of all endpoints have more than two versions of the application. Fewer than 1 percent run the newest version of Java: version 7 Update 25, Bit9 found... why don't enterprises merely purge older versions of Java? It's the old legacy application problem. Applications that are tied to a specific version of Java could lose functionality if only the new version of Java were running..."
:fear:
AplusWebMaster
2013-08-27, 18:52
FYI...
Java 6 0-Day exploit-in-the-wild
- https://community.qualys.com/blogs/laws-of-vulnerabilities/2013/08/26/java-6-0-day-exploit-in-the-wild
Aug 26, 2013 - "CVE-2013-2463 is a vulnerability in the Java 2D subcomponent, that was addressed by Oracle in the June 2013 Critical Patch Update for Java 7. Java 6 (including the latest u45) has the same vulnerability, as Oracle acknowledges in the CPU, but since Java 6 has become unsupported as of its End-of-Life in April 2013, there is no patch for the vulnerability... this time, things have become a bit more serious. As Matthew Schwartz reports in Informationweek*, F-Secure has seen exploits for this vulnerability in Java 6 in the wild. Further they have seen it included in the Neutrino exploit kit, which guarantees that it will find widespread adoption. In addition, we still see very high rates of Java 6 installed (a bit over 50%), which means many organizations are vulnerable..."
* https://www.informationweek.com/security/vulnerabilities/hackers-target-java-6-with-security-expl/240160443
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2463 - 10.0 (HIGH)
___
- https://community.qualys.com/blogs/laws-of-vulnerabilities/2013/08/26/java-6-0-day-exploit-in-the-wild
Comments: "... OpenJDK 6 remains supported and actively patched for security flaws. An OpenJDK 6 patch for CVE-2013-2463 is available":
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-July/023941.html
___
- http://blog.trendmicro.com/trendlabs-security-intelligence/java-native-layer-exploits-going-up/
Aug 28, 2013 - "... We urge users to carefully evaluate their usage of Java is necessary and ensure that copies of Java that are used are updated, to reduce exposure to present and future Java flaws."
___
- http://krebsonsecurity.com/2013/09/researchers-oracles-java-security-fails/
4 Sep 2013
* http://krebsonsecurity.com/wp-content/uploads/2013/09/javaprompt.png
- https://www.cert.org/blogs/certcc/2013/04/dont_sign_that_applet.html
- http://krebsonsecurity.com/how-to-unplug-java-from-the-browser/
:fear::fear:
AplusWebMaster
2013-09-11, 14:03
FYI...
Java JRE 7u40 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
Sep 10, 2013
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u40-relnotes-2004172.html
Bug Fixes
- http://www.oracle.com/technetwork/java/javase/2col/7u40-bugfixes-2007733.html
Recommended Version 7 Update 40
- https://www.java.com/en/download/manual.jsp
- https://blogs.oracle.com/java/entry/java_se_7_update_40
:fear::fear:
AplusWebMaster
2013-10-15, 23:13
FYI...
Java JRE 7u45 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
"This release includes important security fixes. Oracle strongly recommends that all Java SE 7 users upgrade to this release..."
- https://blogs.oracle.com/java/entry/java_se_7_update_45
Oct 15, 2013
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u45-relnotes-2016950.html
Recommended Version 7 Update 45
- https://www.java.com/en/download/manual.jsp
- http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html#AppendixJAVA
"This Critical Patch Update contains -51- new security fixes for Oracle Java SE. 50 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
- https://secunia.com/advisories/55315/
Release Date: 2013-10-16
Criticality: Highly Critical
Impact: Manipulation of data, Exposure of sensitive information, DoS, System access
Solution Status: Vendor Patch
CVE Reference(s): CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5775, CVE-2013-5776, CVE-2013-5777, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5788, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5801, CVE-2013-5802, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5805, CVE-2013-5806, CVE-2013-5809, CVE-2013-5810, CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820, CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5831, CVE-2013-5832, CVE-2013-5838, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843, CVE-2013-5844, CVE-2013-5846, CVE-2013-5848, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851, CVE-2013-5852, CVE-2013-5854
Original Advisory: Oracle:
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/cpuoct2013verbose-1899842.html#JAVA
___
- http://krebsonsecurity.com/2013/10/java-update-plugs-51-security-holes/
Oct. 16, 2013 - "... seriously consider removing Java altogether. I’ve long urged end users to junk Java unless they have a specific use for it (this advice does not scale for businesses, which often have legacy and custom applications that rely on Java). This widely installed and powerful program is riddled with security holes, and is a top target of malware writers and miscreants..."
___
- https://isc.sans.edu/diary.html?storyid=16811
Last Updated: 2013-10-15 20:17:01 UTC - "... Oracle is now on a quarterly update schedule, starting with this version. Going forward, expect regular updates to be released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
14 January 2014
15 April 2014
15 July 2014
14 October 2014 ..."
:fear::fear:
AplusWebMaster
2014-01-14, 23:59
FYI...
Java JRE 7u51 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
Jan 14, 2014
Java SE Risk Matrix
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html#AppendixJAVA
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
"This release includes important security fixes. Oracle strongly recommends that all Java SE 7 users upgrade to this release..."
- https://blogs.oracle.com/java/entry/java_se_7_update_51
"... important security fixes. Oracle strongly recommends that all Java SE 7 users upgrade to this release..."
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u51-relnotes-2085002.html
Recommended Version 7 Update 51
- https://www.java.com/en/download/manual.jsp
___
- http://www.securitytracker.com/id/1029608
CVE Reference: CVE-2013-5870, CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5893, CVE-2013-5895, CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5902, CVE-2013-5904, CVE-2013-5905, CVE-2013-5906, CVE-2013-5907, CVE-2013-5910, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375, CVE-2014-0376, CVE-2014-0382, CVE-2014-0385, CVE-2014-0387, CVE-2014-0403, CVE-2014-0408, CVE-2014-0410, CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0418, CVE-2014-0422, CVE-2014-0423, CVE-2014-0424, CVE-2014-0428
Jan 14 2014
Impact: Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): prior to 7 Update 51...
- https://secunia.com/advisories/56485/
Release Date: 2014-01-15
Criticality: Highly Critical
Where: From remote
Impact: Manipulation of data, Exposure of sensitive information, DoS, System access...
___
Java Primary Cause of 91% of Attacks
- http://www.eweek.com/security/java-primary-cause-of-91-percent-of-attacks-cisco.html
2014-01-16 - "... no one technology was more abused or more culpable that Java, according to Cisco's latest annual security report*... What that means is that the final payload in observed attacks was a Java exploit..."
* http://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html
"... 91% of web exploits target Java..."
:fear::fear:
AplusWebMaster
2014-03-19, 13:19
FYI...
Java SE 8
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Mar 18, 2014
Java SE 8 Now Available
- https://blogs.oracle.com/java/entry/java_se_embedded_8
JRE 8
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
JDK 8 Release Notes
- http://www.oracle.com/technetwork/java/javase/8train-relnotes-latest-2153846.html
"The Java Platform, Standard Edition 8 Development Kit (JDK 8 ) is a feature release of the Java SE platform. It contains new features and enhancements in many functional areas... links to release information about enhancements, changes, bugs, installation, runtime deployment, and documentation. Release Notes files are located on our website only and are not in the documentation download bundle, unless otherwise noted..."
Known Issues for JDK 8
- http://www.oracle.com/technetwork/java/javase/8-known-issues-2157115.html
___
Recommended Version 7 Update 51
- https://www.java.com/en/download/manual.jsp
:fear:
AplusWebMaster
2014-04-16, 05:40
FYI...
Java SE 8u5
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Apr 15, 2014
Release Notes
- http://www.oracle.com/technetwork/java/javase/8train-relnotes-latest-2153846.html
Oracle Java SE Risk Matrix
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html#AppendixJAVA
___
Recommended Version 7 Update 55
- https://www.java.com/en/download/manual.jsp
Release Notes - 7u55
- http://www.oracle.com/technetwork/java/javase/7u55-relnotes-2177812.html
"... This JRE (version 7u55) will expire with the release of the next critical patch update scheduled for July 15, 2014..."
___
- https://secunia.com/advisories/57932/
Release Date: 2014-04-16
Criticality: Highly Critical
Where: From remote
Impact: Manipulation of data, Exposure of sensitive information, DoS, System access
CVE Reference(s): CVE-2013-6629, CVE-2013-6954, CVE-2014-0429, CVE-2014-0432, CVE-2014-0446, CVE-2014-0448, CVE-2014-0449, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-0463, CVE-2014-0464, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2401, CVE-2014-2402, CVE-2014-2403, CVE-2014-2409, CVE-2014-2410, CVE-2014-2412, CVE-2014-2413, CVE-2014-2414, CVE-2014-2420, CVE-2014-2421, CVE-2014-2422, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428
... vulnerabilities are reported in the following products:
* JDK and JRE 7 Update 51 and prior
* JDK and JRE 6 Update 71 and prior
* JDK and JRE 5 Update 61 and prior
* JDK and JRE 8
Solution: Apply updates...
Original Advisory:
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html#AppendixJAVA
:fear:
AplusWebMaster
2014-05-29, 02:58
FYI...
Java JRE 7u60 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
May 28, 2014
Release Notes
- http://www.oracle.com/technetwork/java/javase/7u60-relnotes-2200106.html
... notable bug fixes in this release:
Area: security-libs/java.security
Synopsis: Realm.getRealmsList returns realms list in wrong order...
Bug fixes included in JDK 7u60 release
- http://www.oracle.com/technetwork/java/javase/2col/7u60-bugfixes-2202029.html
___
Recommended Version 7 Update 60
- https://www.java.com/en/download/manual.jsp
:fear:
AplusWebMaster
2014-07-15, 23:19
FYI...
Java 7u65 released
- http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html
July 15, 2014
Java 8u11
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Java SE Risk Matrix
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html#AppendixJAVA
"... contains 20 new security fixes for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication..."
___
Recommended Version 7 Update 65
- https://www.java.com/en/download/manual.jsp
Java Uninstall Tool
- https://www.java.com/en/download/faq/uninstaller_toolinfo.xml
"... simplifying the process of finding and uninstalling older versions of Java. The Uninstall tool shows you a list of the Java versions on your computer and then removes those that are out of date..."
- https://www.java.com/en/download/uninstallapplet.jsp
___
- http://www.securitytracker.com/id/1030577
CVE Reference: CVE-2014-2483, CVE-2014-2490, CVE-2014-4208, CVE-2014-4209, CVE-2014-4216, CVE-2014-4218, CVE-2014-4219, CVE-2014-4220, CVE-2014-4221, CVE-2014-4223, CVE-2014-4227, CVE-2014-4244, CVE-2014-4247, CVE-2014-4252, CVE-2014-4262, CVE-2014-4263, CVE-2014-4264, CVE-2014-4265, CVE-2014-4266, CVE-2014-4268
Jul 15 2014
Impact: Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 5.0u65, Java SE 6u75, Java SE 7u60, Java SE 8u5; and prior versions...
___
- https://atlas.arbor.net/briefs/index#-1227693199
High Severity
17 Jul 2014
:fear:
AplusWebMaster
2014-08-06, 14:33
FYI...
Java 7u67 patch released
- https://blogs.oracle.com/java-platform-group/entry/java_7_update_67_patch
Aug 04, 2014 - "The recent Java 7 update 65 contained an issue that prevents some Applet and Web Start applications from launching. As a result, we have released Java 7 update 67 to restore the functionality for affected users..."
Recommended Version 7 Update 67
- https://www.java.com/en/download/manual.jsp
:fear::fear:
AplusWebMaster
2014-08-19, 23:55
FYI...
Java 8u20 released
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Aug 19, 2014
Release Notes
- http://www.oracle.com/technetwork/java/javase/8u20-relnotes-2257729.html
Java JRE 8u20 download
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
(-still-) Recommended Version 7 Update 67
- https://www.java.com/en/download/manual.jsp
:fear:
AplusWebMaster
2014-10-14, 23:14
FYI...
Java 8u25 released
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
Oct 14, 2014 - "This release includes important security fixes. Oracle strongly recommends that all Java SE 8 users upgrade to this release."
Release Notes
- http://www.oracle.com/technetwork/java/javase/8u25-relnotes-2296185.html
Java JRE 8u25 downloads
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Java JDK 8u25 downloads
- http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
Recommended Version 8 Update 25
- https://www.java.com/en/download/manual.jsp
... if you still need to use Java at all. If not - uninstall it!
___
- http://www.securitytracker.com/id/1031035
CVE Reference: CVE-2014-0050, CVE-2014-2478, CVE-2014-4289, CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4293, CVE-2014-4294, CVE-2014-4295, CVE-2014-4296, CVE-2014-4297, CVE-2014-4298, CVE-2014-4299, CVE-2014-4300, CVE-2014-4301, CVE-2014-4310, CVE-2014-6452, CVE-2014-6453, CVE-2014-6454, CVE-2014-6455, CVE-2014-6467, CVE-2014-6483, CVE-2014-6537, CVE-2014-6538, CVE-2014-6542, CVE-2014-6544, CVE-2014-6545, CVE-2014-6546, CVE-2014-6547, CVE-2014-6560, CVE-2014-6563, CVE-2014-6513, CVE-2014-6532, CVE-2014-6503, CVE-2014-6456, CVE-2014-6562, CVE-2014-6485, CVE-2014-6492, CVE-2014-6493, CVE-2014-4288, CVE-2014-6466, CVE-2014-6458, CVE-2014-6468, CVE-2014-6506, CVE-2014-6511, CVE-2014-6476, CVE-2014-6515, CVE-2014-6504, CVE-2014-6519, CVE-2014-6517, CVE-2014-6531, CVE-2014-6512, CVE-2014-6457, CVE-2014-6527, CVE-2014-6502, CVE-2014-6558
Oct 15 2014
Impact: Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Fix Available: Yes Vendor Confirmed: Yes
Description: Multiple vulnerabilities were reported in Oracle Java. A remote or local user can obtain elevated privileges on the target system. A remote user can partially access and modify data...
Solution: The vendor has issued a fix as part of the Oracle Critical Patch Update Advisory - October 2014.
The vendor's advisory is available at:
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
>> http://www.oracle.com/technetwork/topics/security/cpuoct2014verbose-1972962.html#JAVA
:fear::fear:
AplusWebMaster
2015-01-21, 02:33
FYI...
Java 8u31 released
- http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
Jan 20, 2015
Release notes
- http://www.oracle.com/technetwork/java/javase/8u31-relnotes-2389094.html
Bug Fixes
- http://www.oracle.com/technetwork/java/javase/2col/8u31-bugfixes-2389095.html
JRE Downloads
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Oracle Java SE Risk Matrix
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixJAVA
Jan 20, 2015
Recommended Version 8 Update 31
- https://www.java.com/en/download/manual.jsp
Jan 20, 2015
... -if- you still need to use Java at all. If not - uninstall it!
- https://blogs.oracle.com/security/entry/january_2015_critical_patch_update
Jan 20, 2015 - "... Organizations should disable the use of all versions of SSL as they can no longer rely on SSL to ensure secure communications between systems. Customers should update their custom code to switch to a more resilient protocol (e.g., TLS 1.2). They should also expect that all versions of SSL be disabled in all Oracle software moving forward. A manual configuration change can allow Java SE clients and server endpoints, which have been updated with this Critical Patch Update, to continue to temporarily use SSL v3.0. However, Oracle strongly recommends organizations to phase out their use of SSL v3.0 as soon as possible..."
>> https://www.ssllabs.com/ssltest/viewMyClient.html
___
- http://www.securitytracker.com/id/1031580
CVE Reference: CVE-2014-6549, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-6601, CVE-2015-0383, CVE-2015-0395, CVE-2015-0400, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412, CVE-2015-0413, CVE-2015-0421, CVE-2015-0437
Jan 20 2015
Impact: Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 5.0u75, 6u85, 7u72, 8u25 ...
Solution: The vendor has issued a fix as part of the Oracle Critical Patch Update Advisory - January 2015.
> http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixJAVA
:fear::fear:
AplusWebMaster
2015-03-07, 12:44
FYI...
Java 8u40 released
- http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
Mar 4, 2015
Release notes
- http://www.oracle.com/technetwork/java/javase/8u40-relnotes-2389089.html
Downloads / JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Recommended Version 8 Update 40
- https://www.java.com/en/download/manual.jsp
Mar 4, 2015
... -if- you still need to use Java at all. If not - uninstall it!
___
- http://www.engadget.com/2015/03/06/java-adware-mac/
March 6 2015 - "... For Java 8 Update 40 on Mac, the update instructions now confirm that "Oracle has partnered with companies that offer various products," including Ask .com (McAfee products have also been bundled on the PC)... the parent company of Ask .com - which also owns Tinder, OKCupid, the Daily Beast and others - paid out $883 million to partners like Oracle to distribute its toolbar and other wares..."
> https://www.java.com/ga/images/en/mac_sponsors.jpg
:fear:
AplusWebMaster
2015-04-14, 23:17
FYI...
Java 8u45 released
- http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
Apr 14, 2015
Release notes
- http://www.oracle.com/technetwork/java/javase/8u45-relnotes-2494160.html
Downloads / JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Recommended Version 8 Update 45
- https://www.java.com/en/download/manual.jsp
Apr 14, 2015
... -if- you still need to use Java at all. If not - uninstall it!
___
- http://www.securitytracker.com/id/1032120
CVE Reference: CVE-2015-0458, CVE-2015-0459, CVE-2015-0460, CVE-2015-0469, CVE-2015-0470, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0484, CVE-2015-0486, CVE-2015-0488, CVE-2015-0491, CVE-2015-0492
Apr 14 2015
Impact: Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): Java SE 5.0u81, 6u91, 7u76, 8u40; Java FX 2.2.76...
Solution: The vendor has issued a fix as part of Oracle Critical Patch Update Advisory - April 2015.
> http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixJAVA
"... contains 14 new security fixes for Oracle Java... All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
> http://www.oracle.com/technetwork/topics/security/cpuapr2015verbose-2365613.html#JAVA
:fear::fear:
AplusWebMaster
2015-07-15, 01:26
FYI...
Java 8u51 released
Release Notes
- http://www.oracle.com/technetwork/java/javase/8u51-relnotes-2587590.html
Downloads / JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Recommended Version 8 Update 51
- https://www.java.com/en/download/manual.jsp
July 14, 2015
... -if- you still need to use Java at all. If not - uninstall it!
___
Patch Availability Table
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
"... contains 25 new security fixes for Oracle Java SE. 23 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password..."
- https://blogs.oracle.com/security/entry/july_2015_critical_patch_update
Jul 14, 2015 - "... 25 fixes Oracle Java SE. 23 of these Java SE vulnerabilities are remotely exploitable without authentication. 16 of these Java SE fixes are for Java client-only, including one fix for the client installation of Java SE. 5 of the Java fixes are for client and server deployment. One fix is specific to the Mac platform. And 4 fixes are for JSSE client and server deployments. Please note that this Critical Patch Update also addresses a recently announced 0-day vulnerability (CVE-2015-2590), which was being reported as actively exploited in the wild..."
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2590
Last revised: 07/16/2015
10.0 (HIGH)
___
- http://www.securitytracker.com/id/1032910
CVE Reference: CVE-2015-2590, CVE-2015-2596, CVE-2015-2597, CVE-2015-2601, CVE-2015-2613, CVE-2015-2619, CVE-2015-2621, CVE-2015-2625, CVE-2015-2627, CVE-2015-2628, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638, CVE-2015-2659, CVE-2015-2664, CVE-2015-2808, CVE-2015-4000, CVE-2015-4729, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4736, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760
Jul 15 2015
Impact: Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available: Yes Vendor Confirmed: Yes ...
Solution: The vendor has issued a fix as part of Oracle Critical Patch Update Advisory - July 2015.
:fear::fear:
AplusWebMaster
2015-10-20, 23:59
FYI...
Java 8u65 released
Oct 20, 2015
Release Notes
- http://www.oracle.com/technetwork/java/javase/8u65-relnotes-2687063.html
Downloads / JRE
- http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Recommended Version 8 Update 65
- https://www.java.com/en/download/manual.jsp
... -if- you still need to use Java at all. If not - uninstall it!
___
Patch Availability Table
> http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixJAVA
- https://blogs.oracle.com/security/entry/october_2015_critical_patch_update
"... Oracle Java SE receives -25- new security fixes, -24- of which are remotely exploitable without authentication. The highest reported CVSS Base Score for these Java SE vulnerabilities is 10.0. -20- of the Java SE vulnerabilities only affect client deployment of Java SE (e.g., Java in the browser). The remaining 5 vulnerabilities affect client and server deployments of Java SE... remove obsolete JAVA SE versions from their desktop if they are not needed..."
___
- http://www.securitytracker.com/id/1033884
CVE Reference: CVE-2015-4734, CVE-2015-4803, CVE-2015-4805, CVE-2015-4806, CVE-2015-4810, CVE-2015-4835, CVE-2015-4840, CVE-2015-4842, CVE-2015-4843, CVE-2015-4844, CVE-2015-4860, CVE-2015-4868, CVE-2015-4871, CVE-2015-4872, CVE-2015-4881, CVE-2015-4882, CVE-2015-4883, CVE-2015-4893, CVE-2015-4901, CVE-2015-4902, CVE-2015-4903, CVE-2015-4906, CVE-2015-4908, CVE-2015-4911, CVE-2015-4916
Oct 20 2015
Impact: Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u101, 7u85, 8u60; Embedded 8u51 ...
Solution: The vendor has issued a fix as part of the October 2105 Oracle Critical Patch Update.
:fear::fear:
AplusWebMaster
2016-01-20, 03:12
FYI...
Java 8u71 Update Release Notes
- http://www.oracle.com/technetwork/java/javase/8u71-relnotes-2773756.html
Jan 19, 2016
Java SE Risk Matrix
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixJAVA
> http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html#JAVA
Recommended Version 8 Update 71
- https://www.java.com/en/download/manual.jsp
Jan 19, 2016
... -if- you still need to use Java at all. If not - uninstall it!
___
- http://www.securitytracker.com/id/1034713
CVE Reference: CVE-2015-8126, CVE-2015-8472
Jan 19 2016
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u105, 7u91, 8u66
Impact: A remote user can create content that, when loaded by the target application, will execute arbitrary code on the target user's system.
Solution: Oracle has issued a fix for Oracle Java SE as part of the January 2016 Oracle Critical Patch Update.
- http://www.securitytracker.com/id/1034714
CVE Reference: CVE-2015-7575
Jan 19 2016
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u105, 7u91, 8u66
Impact: A remote user can conduct hash collision forgery attacks.
Solution: Sun has issued a fix for CVE-2015-7575 for Oracle Java SE as part of the January 2016 Oracle Critical Patch Update.
- http://www.securitytracker.com/id/1034715
CVE Reference: CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0475, CVE-2016-0483, CVE-2016-0494
Jan 20 2016
Impact: A remote user can obtain data on the target system.
A remote user can modify data on the target system.
A remote user can cause partial denial of service conditions.
A remote user can gain elevated privileges on the target system.
Solution: The vendor has issued a fix as part of the January 2016 Oracle Critical Patch Update.
:fear::fear:
AplusWebMaster
2016-02-07, 14:39
FYI...
Java 8u73 released
- https://www.java.com/en/download/manual.jsp
Recommended Version 8 Update 73
Feb 5, 2016
Java 8u73 Update Release Notes
- http://www.oracle.com/technetwork/java/javase/8u73-relnotes-2874654.html
- http://www.oracle.com/technetwork/java/javase/downloads/index.html
- http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html#AppendixJAVA
Notes: Applies to installation of Java SE on Windows only.
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0603
- https://blogs.oracle.com/security/entry/security_alert_cve_2016_0603
Feb 05, 2016 - "... unsuspecting user (can) be tricked into visiting a malicious web site and download files to the user's system before installing Java 6, 7 or 8... vulnerability may result, if successfully exploited, in a complete compromise of the unsuspecting user’s system..."
- https://www.us-cert.gov/ncas/current-activity/2016/02/08/Oracle-Releases-Security-Updates-Java
February 08, 2016
> http://www.securitytracker.com/id/1034969
Feb 9 2016
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear:
AplusWebMaster
2016-03-24, 01:45
FYI...
Java 8u77 released
- https://www.java.com/en/download/manual.jsp
Recommended Version 8 Update 77
March 23, 2016
Release Notes
- http://www.oracle.com/technetwork/java/javase/8u77-relnotes-2944725.html
"... This JRE (version 8u77) will expire with the release of the next critical patch update scheduled for April 19, 2016..."
> http://www.oracle.com/technetwork/java/javase/downloads/index.html
- https://blogs.oracle.com/security/entry/security_alert_cve_2016_0636
Mar 23, 2016 - "Oracle released Security Alert CVE-2016-0636* to address a vulnerability affecting Java SE in web browsers on desktops. This vulnerability has received a CVSS Base Score of 9.3 and is remotely exploitable without authentication. A successful exploitation of this vulnerability would typically require an unsuspecting user running an affected version of Java SE to visit a malicious web site. Oracle recommends customers apply this Security Alert as soon as possible..."
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0636
* http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html#AppendixJAVA
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear:
AplusWebMaster
2016-04-20, 00:19
FYI...
Java 8u91 released
- https://www.java.com/en/download/manual.jsp
April 19, 2016
Bug Fixes
- http://www.oracle.com/technetwork/java/javase/2col/8u91-bugfixes-2949464.html
Risk Matrix for Oracle Java SE
- http://www.oracle.com/technetwork/topics/security/cpuapr2016verbose-2881709.html#JAVA
Oracle Security Alert for CVE-2016-0636
- http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html
"This Security Alert addresses CVE-2016-0636, a vulnerability affecting Java SE running in web browsers on desktops... This vulnerability may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages this vulnerability. Successful exploits can impact the availability, integrity, and confidentiality of the user's system. Due to the severity of this vulnerability and the public disclosure of technical details, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible..."
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0636
Last revised: 04/12/2016
9.3 HIGH
- http://www.securitytracker.com/id/1035596
CVE Reference: CVE-2016-0686, CVE-2016-0687, CVE-2016-0695, CVE-2016-3422, CVE-2016-3425, CVE-2016-3426, CVE-2016-3427, CVE-2016-3443, CVE-2016-3449
Apr 19 2016
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u113, 7u99, 8u77...
Impact: A remote user can obtain data on the target system.
A remote user can gain elevated privileges on the target system.
Solution: Oracle has issued a fix as part of the April 2016 Oracle Critical Patch Update...
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear:
AplusWebMaster
2016-07-20, 14:01
FYI...
Java 8 Update 101 released
- https://www.java.com/en/download/manual.jsp
Recommended Version 8 Update 101
July 19, 2016
Release Notes
- http://www.oracle.com/technetwork/java/javase/8u101-relnotes-3021761.html
Risk Matrix
- http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html#JAVA
- http://www.securitytracker.com/id/1036365
CVE Reference: CVE-2016-3458, CVE-2016-3485, CVE-2016-3498, CVE-2016-3500, CVE-2016-3503, CVE-2016-3508, CVE-2016-3511, CVE-2016-3550, CVE-2016-3552, CVE-2016-3587, CVE-2016-3598, CVE-2016-3606, CVE-2016-3610
Jul 19 2016
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u115, 7u101, 8u92 ...
Impact: A remote user can obtain and modify data on the target system.
A remote user can cause denial of service conditions.
A remote or local user can obtain elevated privileges on the target system.
A local user can modify data on the target system.
Solution: The vendor has issued a fix as part of the July 2016 Oracle Critical Patch Update (8 Update 101)...
___
- https://blog.qualys.com/laws-of-vulnerabilities/2016/07/19/oracle-july-2016-critical-patch-update
July 19, 2016 - "... patches for Java SE fix 13 security issues out of which 9 can be compromised remotely over the network..."
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear:
AplusWebMaster
2016-10-19, 11:31
FYI...
Java 8 Update 111 released
- https://www.java.com/en/download/manual.jsp
Oct 18, 2016
- https://www.java.com/en/download/faq/remove_olderversions.xml
"... We highly recommend that you uninstall all older versions of Java from your system. Keeping old versions of Java on your system presents a serious security risk..."
___
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
- http://www.securitytracker.com/id/1037040
CVE Reference: CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5568, CVE-2016-5573, CVE-2016-5582, CVE-2016-5597
Oct 18 2016
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u121, 7u111, 8u102; Java SE Embedded: 8u101 ...
Impact: A remote user can obtain data on the target system.
A remote user can partially modify data on the target system.
A remote user can gain elevated privileges on the target system.
Solution: The vendor has issued a fix as part of the October 2016 Oracle Critical Patch Update.
The vendor's advisory is available at:
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear:
AplusWebMaster
2017-01-18, 12:14
FYI...
Java 8 Update 121 released
- https://www.java.com/en/download/manual.jsp
Jan 17, 2017
8u121 Update Release Notes
- http://www.oracle.com/technetwork/java/javase/8u121-relnotes-3315208.html
Jan 17, 2017
- https://www.java.com/en/download/faq/remove_olderversions.xml
"... We highly recommend that you uninstall all older versions of Java from your system. Keeping old versions of Java on your system presents a serious security risk..."
___
- http://www.securitytracker.com/id/1037637
CVE Reference: CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2016-5549, CVE-2016-5552, CVE-2016-8328, CVE-2017-3231, CVE-2017-3241, CVE-2017-3252, CVE-2017-3253, CVE-2017-3259, CVE-2017-3260, CVE-2017-3261, CVE-2017-3262, CVE-2017-3272, CVE-2017-3289
Jan 19 2017
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u131, 7u121, 8u112 ...
Impact: A remote user can obtain data on the target system.
A remote user can modify data on the target system.
A remote user can cause denial of service conditions.
A remote user can gain elevated privileges on the target system.
Solution: The vendor has issued a fix as part of the January 2017 Oracle Critical Patch Update (8 Update 121)...
___
- https://blog.qualys.com/laws-of-vulnerabilities/2017/01/17/oracle-january-2017-cpu-fixes-270-vulnerabilities
Jan 17, 2017 - "... Java: This Critical Patch Update contains -17- new security fixes for Oracle Java SE. Sixteen (16) of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network -without- requiring user credentials. We recommend that organizations patch as soon as possible..."
Java SE Risk Matrix
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear:
AplusWebMaster
2017-04-19, 01:20
FYI...
Java 8 Update 131 released
- https://www.java.com/en/download/manual.jsp
April 18, 2017
Text Form - Risk Matrix for Oracle Java SE
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017verbose-3236619.html#JAVA
- https://www.java.com/en/download/faq/remove_olderversions.xml
"... We highly recommend that you uninstall all older versions of Java from your system. Keeping old versions of Java on your system presents a serious security risk. Uninstalling older versions of Java from your system ensures that Java applications will run with the latest security and performance improvements on your system..."
... -if- you still need to use Java at all. If not - uninstall it!
___
- http://www.securitytracker.com/id/1038286
CVE Reference: CVE-2017-3509, CVE-2017-3511, CVE-2017-3512, CVE-2017-3514, CVE-2017-3526, CVE-2017-3533, CVE-2017-3539, CVE-2017-3544
Apr 19 2017
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6u141, 7u131, 8u121 ...
Impact: A remote user can obtain data on the target system.
A remote user can modify data on the target system.
A remote user can cause denial of service conditions.
A local user can obtain elevated privileges on the target system.
A remote user can gain elevated privileges on the target system.
Solution: The vendor has issued a fix (8 Update 131) as part of the April 2017 Oracle Critical Patch Update.
:fear::fear:
AplusWebMaster
2017-07-19, 00:06
FYI...
End of Public Updates for Oracle JDK 8
> http://www.oracle.com/technetwork/java/eol-135779.html
Sep 12, 2017 - "... Oracle will not post further updates of Java SE 8 to its public download sites for commercial use after September 2018. Customers who need continued access to critical bug fixes and security fixes as well as general maintenance for Java SE 8 or previous versions can get long term support through Oracle Java SE Advanced, Oracle Java SE Advanced Desktop, or Oracle Java SE Suite. All other users are recommended to upgrade to the latest major releases of the Oracle JDK or OpenJDK.
Oracle does -not- plan to migrate desktops from Java 8 to Java 9 through the auto update feature. Instead of relying on a pre-installed standalone JRE, we will begin encouraging application developers to deliver JREs with their applications. More details will be made available through early 2018...
Long Term Support...
** Java SE 9 will be a short term release, and users should immediately transition to the next release (18.3) when available.
*** Oracle has proposed a new version scheme (YY.M) starting in March, 2018. Java SE 18.3 will be a short term release and users should transition to the next release when available."
___
Java 8 u144 released
- https://www.java.com/en/download/manual.jsp
July 26, 2017
Blog: https://blogs.oracle.com/thejavatutorials/jdk-8u144-released
July 26, 2017 - "... This is an out-of-cycle patch release to address a -regression- reported in Java WebStart. You can download the latest JDK releases from the Java SE Downloads page*. Oracle strongly recommends that all Java SE users upgrade to these releases..."
* http://www.oracle.com/technetwork/java/javase/downloads/index.html
Remove Older Versions: Java Uninstall tool:
- https://www.java.com/en/download/uninstalltool.jsp
"Out-of-date versions of Java on your computer may present a serious security risk. If out-of-date versions are found, this tool will help you remove them..."
Release notes: http://www.oracle.com/technetwork/java/javase/8u144-relnotes-3838694.html
Bug Fixes: http://www.oracle.com/technetwork/java/javase/2col/8u144-bugfixes-3839149.html
____
Java 8 Update 141 released
- https://www.java.com/en/download/manual.jsp
July 18, 2017
Text Form of Risk Matrix for Oracle Java SE
- http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
"This Critical Patch Update contains -32- new security fixes for Oracle Java SE. 28 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials..."
- http://www.securitytracker.com/id/1038931
CVE Reference: CVE-2017-10053, CVE-2017-10067, CVE-2017-10074, CVE-2017-10078, CVE-2017-10081, CVE-2017-10086, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10104, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10111, CVE-2017-10114, CVE-2017-10115, CVE-2017-10116, CVE-2017-10117, CVE-2017-10118, CVE-2017-10121, CVE-2017-10125, CVE-2017-10135, CVE-2017-10145, CVE-2017-10176, CVE-2017-10193, CVE-2017-10198, CVE-2017-10243
Jul 18 2017
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6 Update 151, 7 Update 141, 8 Update 131 ...
Impact: A remote user can obtain data on the target system.
A remote user can modify data on the target system.
A remote user can cause denial of service conditions.
A local user can obtain elevated privileges on the target system.
A remote user can gain elevated privileges on the target system.
Solution: The vendor has issued a fix as part of the July 2017 Oracle Critical Patch Update (8 Update 141)...
- https://java.com/en/download/help/firefox_java.xml
Browser(s) Firefox
Java version(s): 7.0, 8.0
"Mozilla offers an Extended Support Release (ESR) version of Firefox specifically for use by organizations who need extended support for mass deployments. Only Mozilla Firefox 52 ESR 32-bit release will continue offering support for the standards-based plugin support technology required to launch Java Applets. To see if you are using an ESR release, check the Firefox menu item (Help -> About) and looking for the "ESR" identifier."
___
... -if- you still need to use Java at all. If not - uninstall it!
:fear::fear: