Forgot your password?
typodupeerror
Java Oracle Security

Oracle Rushes Emergency Java Update To Patch McRAT Vulnerabilities 165

Posted by Unknown Lamer
from the brought-to-you-by-c-sharp dept.
msm1267 writes "Oracle has once again released an emergency Java update to patch zero-day vulnerabilities in the browser plug-in, the fifth time it has updated the platform this year. Today's update patches CVE-2013-1493 and CVE-2013-0809, the former was discovered last week being exploited in the wild for Java 6 update 41 through Java 7 update 15. The vulnerability allows for arbitrary memory execution in the Java virtual machine process; attackers exploiting the flaw were able to download the McRAT remote access Trojan."
This discussion has been archived. No new comments can be posted.

Oracle Rushes Emergency Java Update To Patch McRAT Vulnerabilities

Comments Filter:
  • by TsuruchiBrian (2731979) on Monday March 04, 2013 @08:53PM (#43074623)
    You can have the java virtual machine installed without using the java applet plugin for your browser. The recent security problems are only for the java applet browser plugin, which is now disabled by default by firefox and probably other browsers as well.
  • by Anonymous Coward on Monday March 04, 2013 @09:02PM (#43074661)
    I use Libre Office just fine without Java installed. Maybe some plugins still need it, but I've never had it complain that I was missing it.
  • OpenJDK .. (Score:4, Interesting)

    by dgharmon (2564621) on Monday March 04, 2013 @09:22PM (#43074811) Homepage
    Does this exploit work under the OpenJDK [wikipedia.org] Runtime Environment?
  • by smash (1351) on Monday March 04, 2013 @09:31PM (#43074859) Homepage Journal
    .... and Base is pretty damn broken anyhow. I tested it a couple of months back - create new database. create a single table with 2 fields, a primary key and a name. It crashed when I tried to save the table design. Doesn't exactly inspire confidence as far as holding my data goes, which is somewhat crucial for a DATABASE.
  • Re:Uninstall (Score:3, Interesting)

    by Decker-Mage (782424) <jack_of_shadows@yahoo.com> on Monday March 04, 2013 @11:31PM (#43075481)
    Sadly, more than a few "security" tools here require Java or .NET.
  • Re:LOL (Score:5, Interesting)

    by TheRaven64 (641858) on Tuesday March 05, 2013 @05:23AM (#43076879) Journal
    This has nothing to do with Oracle. The browser plugin has a long history of security holes going back well over a decade and the bitching has been going on since 1995. The problem is that writing a language implementation that is both fast and 100% correct is really hard. The safety properties of Java (and any other managed language) rely on the implementation being 100% correct. This is relatively easy for something like the Squeak Smalltalk VM, which is a single-threaded bytecode interpreter with a stop-the-world garbage collector, but people insist on the JVM doing all sorts of optimisations, supporting multiple threads and so on. The early complaints about Java were that it was slow. The more recent complaints are that it's not correct. Well, you have three choices:
    • Have a slow VM.
    • Have a fast, but incorrect, VM, and be aware that every error is a potential security hole.
    • Formally verify your VM. Be aware that this will cost at least 30 times as much[1] as the non-verified version.

    Relying on software enforcement for security is just asking for trouble.

    [1] The factor of 30 comes from seL4 which, to mu knowledge, is the formally verified project that managed the smallest overhead. Other estimates from other projects are 100 or more times the cost.

"Don't talk to me about disclaimers! I invented disclaimers!" -- The Censored Hacker

Working...