Wednesday, September 17, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Sony To Offer Unity For PlayStation To PlayStation Licensed Developers
Blackberry Introduces Elegant Porsche Design P9983 Smartphone
Club 3D Launches 4K Docking Station
Logitech Gives You Control of Your Smart Home with the New Harmony Living Home Lineup
New iPads And OS X Yosemite Announcements Expected Next Month
Opera Max Data-savings App to be Embedded into MediaTek's LTE SoCs
Nero 2015 Supports Burning via Smartphone, WiFi Streaming
PMC Delivers 16-port SAS and SATA Storage Controllers
Active Discussions
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
 Home > News > General Computing > New Eme...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, March 05, 2013
New Emergency Fix Releaseed For Java zero-day Exploit Released


Oracle on Monday released Security Alert CVE-2013-1493, to address two vulnerabilities affecting Java running in web browsers (CVE-2013-1493 and CVE-2013-0809).

These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password. For an exploit to be successful, an unsuspecting user running an affected release in a browser must visit a malicious web page that leverages these vulnerabilities.

One of these vulnerabilities (CVE-2013-1493) has recently been reported as being actively exploited by attackers to maliciously install the McRat executable onto unsuspecting users' machines. Both vulnerabilities affect the 2D component of Java SE. These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software. These vulnerabilities have each received a CVSS Base Score of 10.0.

Oracle recommends that this Security Alert be applied as soon as possible. Desktop users can install this new version from java.com or through the Java autoupdate.

Oracle has recently switched Java security settings to "high" by default. This high security setting results in requiring users to expressly authorize the execution of applets which are either unsigned or are self-signed. As a result, unsuspecting users visiting malicious web sites will be notified before an applet is run and will gain the ability to deny the execution of the potentially malicious applet. In order to protect themselves, desktop users should only allow the execution of applets when they expect such applets and trust their origin.


Previous
Next
New ZOTAC StreamBox and RAIDbox Ease Digital Sharing        All News        IBM To Make Its Cloud Services and Software Open Sourced-based
Samsung To Buy Stake in Rival Sharp     General Computing News      IBM To Make Its Cloud Services and Software Open Sourced-based

Get RSS feed Easy Print E-Mail this Message

Related News
Oracle To Buy Micros Systems
Oracle Accelerates Its Databases
Oracle Wins Appeal In Legal Battle With Google
Microsoft Retains No. 1 Spot; Oracle Moves Into No. 2 In Global Software Market
Oracle Buys Responsys For $1.5 billion
GPU Acceleration Coming to Java
IBM, Oracle, EMC To Face China Probe Over Security Concerns: report
ARM and Oracle to Optimize Java SE for Enterprise and Embedded Markets
Microsoft and Oracle Team Up On Cloud Computing
Oracle Unveils Faster Servers
New Critical Patch For Java SE Released
Oracle Buys Acme Packet

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .