Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Java Oracle Security

Researcher Develops Patch For Java Zero Day In 30 Minutes 57

Trailrunner7 writes "A security researcher has submitted to Oracle a patch he said took him 30 minutes to produce that would repair a zero-day vulnerability currently exposed in Java SE. He hopes his actions will spur Oracle to issue an out-of-band patch for the sandbox-escape vulnerability, rather than wait for the February 2013 Critical Patch Update as Oracle earlier said it would. Adam Gowdiak of Polish security consultancy Security Explorations reported the vulnerability to Oracle on Sept. 25, as well as proof-of-concept exploit code his team produced. The vulnerability is present in Java versions 5, 6 and 7 and would allow an attacker to remotely control an infected machine once a user landed on a malicious website hosting the exploit. Gowdiak said his proof-of-concept exploit was successfully used against a fully patched Windows 7 machine using Firefox 15.0.1, Chrome 21, IE 9, Opera 12, and Safari 5.1.7."
This discussion has been archived. No new comments can be posted.

Researcher Develops Patch For Java Zero Day In 30 Minutes

Comments Filter:
  • Re:Patch right here! (Score:4, Informative)

    by Deathlizard ( 115856 ) on Tuesday October 23, 2012 @07:22PM (#41746437) Homepage Journal

    1) install 64 bit java
    2) Uninstall IE, or don't use IE 64 bit.
    3) remember to update, because 64 bit java doesn't have an updater. Not that it works anyway.

    The 32 bit browsers (chrome, firefox, even 32 bit IE) won't use the 64 bit java to run applets and since IE is the only 64 bit browser and cannot be set as the default browser, it will limit your attack surface.

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...