The Security Detail

Jan 14 2013   3:23PM GMT

Critical patches pushed for Java and IE zero day flaws



Posted by: Tony Bradley
Tags:
Internet Explorer
Java
patch
zero-day

Happy Monday! IT and security admins are off to a busy start this week with urgent out-of band patches from both Oracle and Microsoft.

Oracle has been under fire for days following attacks against a new zero day flaw in Java. Zero day vulnerabilities are certainly not unique to Oracle, or Java, but many security experts and IT admins are disgruntled over how Oracle’s approach to security in general, and its response to serious incidents like this.

Andrew Storms, director of security operations for nCircle, shared some thoughts about the urgent updates. “Pushing the Java patch out ahead of their regular bulleting is a step in the right direction for Oracle, but it may be too little too late. There has already been some lost confidence in Java. Oracle really needs to step up their security game.”

Wolfgang Kandek, CTO of Qualys, says, “I still recommend disabling Java in the browser using the Java Control Panel. for better security against future threats that tend to come down through the browser attack vector.” Kandek goes on to say that users who actually need to use Java should at least go into the Java Control Panel and uncheck the box labeled “Enable Java content in the browser”.

On the subject of Internet Explorer, Storms said, “The out-of-band IE bulletin should come as no surprise. Microsoft issued an advance notification this weekend announcing their intention to go out-of-band with a single CVE to address the zero-day bug currently being exploited in the wild,” adding, “I wouldn’t be at all surprised to see another IE bulleting in February in addition to today’s patch. Some people moan and complain about the volume of IE patches, but in my book regular browser patches are a good thing. Browsers are the primary window to the Internet for almost everyone so they are constantly under attack by cyber criminals.”

Kandek emphasizes some important information about the IE patch. “Please note that this update is a real patch and not a cumulative update, as we are used to for typical Internet Explorer updates. It is highly recommended to have MS12-077 (the last cumulative Internet Explorer update) installed before applying MS13-008.”

If you use Java and/or Internet Explorer 6, 7, or 8 you should immediately apply the appropriate updates. An alternate solution for Java would be to simply uninstall it if you aren’t actively using it. Windows Vista, Windows 7, and Windows 8 users can also avoid the zero day issue by updating to Internet Explorer 9–which is not affected by this vulnerability.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: