Oracle pushes out Java patches as zero-day vulnerabilities exposed
Emergency fix blocks high-risk vulnerabilities exploited by malicious websites
By Jeremy Kirk | Published: 09:01, 14 January 2013
The company's speed in issuing patches may be due to part that exploit code for at least one of the vulnerabilities, CVE-2013-0422, has already been wrapped into two "exploit kits" or packages of attack code inserted into websites that already have other vulnerabilities. The problem became public last week.
"Oracle recommends that this security alert be applied as soon as possible because these issues may be exploited 'in the wild' and some exploits are available in various hacking tools," wrote Oracle's Eric Maurice[cq] on the company's security blog.
Related Articles on Techworld
Both vulnerabilities expose users to the possibility of being attacked by a malicious "applet," which is a Java application that is downloaded from another server and runs if a user has Java installed. Applets are embedded in web pages and run in the browser.
If a user browsed to a website rigged with an exploit pack, malicious software can be unnoticeably delivered, making it one of the most dangerous kinds of attacks.
The affected software platforms are any system using Oracle's Java 7 (1.7, 1.7.0) through the 10th update, according to an advisory from the U.S. Computer Emergency Readiness Team. That also includes Java Platform Standard Edition 7, Java SE Development Kit and Java SE Runtime Environment.
The vulnerability lies "in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system," US CERT said.
The second patch repairs a vulnerability, CVE-2012-3174, in Java that runs in web browsers, Oracle said. It also can be exploited remotely by tricking users into navigating to a booby-trapped website.
Maurice noted that the security fixes will also switch Java's security setting to "high" by default.
"The high security setting requires users to expressly authorise the execution of applets which are either unsigned or are self-signed," he wrote. "As a result, unsuspecting users visiting malicious web sites will be notified before an applet is run and will gain the ability to deny the execution of the potentially malicious applet."
Oracle has more patches coming on Tuesday. The company plans to release 86 patches covering security vulnerabilities in a variety of products, including 18 fixes for its MySQL database. Two of those MySQL vulnerabilities can be remotely exploited without requiring a username or password, according to Oracle.