Oracle Releases February Java Security Update Ahead of Schedule Dealing with 50 Flaws
Oracle has published a major security update for Java. The update was originally scheduled for February 19th, but was released a fortnight early on Friday because of "active exploitation 'in the wild' of one of the vulnerabilities affecting the Java Runtime Environment (JRE) in desktop browsers".
According to the latest Oracle Risk Matrix, the update covers a total of 50 flaws: 49 of these can be remotely exploited - in other words just visiting a web page, for instance, might be enough to infect your computer; 26 carry the maximum Common Vulnerability Scoring System (CVSS) risk score of 10. Oracle hasn't said which of the remote code execution holes is the one that's actively being exploited but it is addressed with this patch.
The Sophos security blog provides some more information, and notes that "there is no particular reason why a Java application puts your computer at any greater risk than an application based on Windows .EXE files or OS X native binaries". However, being a cross-browser and cross-platform technology with a huge install base makes attacking Java a "high-yield exercise" for malware and virus authors. Sophos therefore recommends that users keep their local Java installs up-to-date. In addition, since the majority of attacks come via the web, browser users are advised to turn Java support off in their browsers until they encounter a site that they trust and which requires it.
The latest official Oracle versions are Java 7 Update 13 and Java 6 Update 39. This month (February 2013) marks the end of life of Java 6 as we previously noted. If you are using OS X 10.6 (Snow Leopard) then the latest update of Apple's version is Java for Mac OS X 10.6 Update 12.
Oracle currently has two more Java SE critical patch updates scheduled for this year, with the next due on the 18th June.
David Beyer, Olaf Carlson-Wee, Richard Minerich Aug 02, 2015