Thanks Dave and Z

* *

*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Thu, Aug 30, 2012 at 2:47 PM, David Lum <david....@nwea.org> wrote:

>
> http://www.forbes.com/sites/andygreenberg/2012/08/30/oracle-quietly-releases-fix-for-serious-java-security-bug-months-after-it-was-reported/
>
> Dave
>
> -----Original Message-----
> From: Ziots, Edward [mailto:ezi...@lifespan.org]
> Sent: Thursday, August 30, 2012 11:31 AM
> To: NT System Admin Issues
> Subject: RE: 0 Day in Java 1.7 up to Version 6
>
> http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-18
> 35715.html?printOnly=1
>
>
> Oracle Security Alert for CVE-2012-4681
>
> Description
> This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert
> TA12-240A) and two other vulnerabilities affecting Java running in web
> browsers on desktops. These vulnerabilities are not applicable to Java
> running on servers or standalone Java desktop applications. They also do
> not affect Oracle server-based software.
>
> These vulnerabilities may be remotely exploitable without authentication,
> i.e., they may be exploited over a network without the need for a username
> and password. To be successfully exploited, an unsuspecting user running an
> affected release in a browser will need to visit a malicious web page that
> leverages this vulnerability. Successful exploits can impact the
> availability, integrity, and confidentiality of the user's system.
>
> In addition, this Security Alert includes a security-in-depth fix in the
> AWT subcomponent of the Java Runtime Environment.
>
> Due to the severity of these vulnerabilities, the public disclosure of
> technical details and the reported exploitation of CVE-2012-4681 "in the
> wild," Oracle strongly recommends that customers apply the updates provided
> by this Security Alert as soon as possible.
>
> Supported Products Affected
> Security vulnerabilities addressed by this Security Alert affect the
> products listed in the categories below.  Please click on the link in the
> Patch Availability column or in the Patch Availability Table to access the
> documentation for those patches.
>
> Affected product releases and versions:
>
> Java SE Patch Availability
> JDK and JRE 7 Update 6 and before       Java SE
> JDK and JRE 6 Update 34 and before      Java SE
> Patch Availability Table and Risk Matrix Java SE fixes in this Security
> Alert are cumulative; this latest update includes all fixes from previous
> Critical Patch Updates and Security Alerts.
>
> Patch Availability Table
> Product Group   Risk Matrix     Patch Availability and Installation
> Information
> Oracle Java SE  Oracle JDK and JRE Risk Matrix
> Oracle Security Alert for CVE-2012-4681 My Oracle Support Note 1486726.1.
> Developers can download the latest Java SE JDK and JRE 7 and 6 releases
> fromhttp://www.oracle.com/technetwork/java/ja
> vase/downloads/index.html.
> Users running Java SE with a browser can download the latest JRE 7 release
> fromhttp://java.com/. Users on the Windows platform can also use
> automatic updates to get the latest JRE 7 and 6 releases.
>
> Credit Statement
> The following people or organizations reported security vulnerabilities
> addressed by this Security Alert to Oracle: Adam Gowdiak of Security
> Explorations; and James Forshaw (tyranid) via TippingPoint.
>
> References
> Oracle Critical Patch Updates and Security Alerts main page [ Oracle
> Technology Network ] Oracle Critical Patch Updates and Security Alerts -
> Frequently Asked Questions [ CPU FAQ ] Risk Matrix definitions [ Risk
> Matrix Definitions ] Use of Common Vulnerability Scoring System (CVSS) by
> Oracle [ Oracle CVSS Scoring ] English text version of risk matrix [ Oracle
> Technology Network ] CVRF XML version of the risk matrix [ Oracle
> Technology Network ] Previous Security Advisories for Java SE and Java for
> Business Security Updates [ Java Sun Alerts Archive Page ] Modification
> History
>
> Date    Comments
> 2012-August-30  Rev 1. Initial Release
>
>
>
> Fire up the Patch Machine, its time again...
>
> Z
>
> Edward E. Ziots, CISSP, Security +, Network + Security Engineer Lifespan
> Organization ezi...@lifespan.org
>
>
> -----Original Message-----
> From: S Powell [mailto:powe...@gmail.com]
> Sent: Thursday, August 30, 2012 2:16 PM
> To: NT System Admin Issues
> Subject: Re: 0 Day in Java 1.7 up to Version 6
>
> according to cert:
> http://www.kb.cert.org/vuls/id/636312
>
> "This issue is addressed in Java 7 Update 7. Also consider the following
> workarounds:"
>
> so I guess the real question is, is it really patched?
>
>
>
> -----------------
> "Choose the highest bidder" was my answer when they told me I was up for
> sale.
>
>
> On Thu, Aug 30, 2012 at 11:03 AM, David Lum <david....@nwea.org> wrote:
> > "After an exploit for them has been added to the Blackhole exploit
> kit, the number of sites functioning as entrance points for malware has
> risen exponentially. According to Patrik Runald, director of security
> research at Websense, the company has already spotted over 100 unique
> domains serving the Java exploit.
> >
> > "The number is definitely growing...and because Blackhole has an
> updatable framework and already has a foothold on thousands of sites, we
> anticipate that the number of sites compromised with this new zero-day will
> escalate rapidly in the coming days," he told Gregg Keizer."
> >
> > - and -
> >
> > "According to researchers from Security Explorations, who found the
> two flaws and reported them to Oracle back in April, the monthly status
> report they received from Oracle less than a week ago shows that both flaws
> have been addressed."
> >
> > Full article: http://www.net-security.org/secworld.php?id=13507
> >
> > David Lum
> > Systems Engineer // NWEATM
> > Office 503.548.5229 // Cell (voice/text) 503.267.9764
> >
> >
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
> > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> >
> > ---
> > To manage subscriptions click here:
> > http://lyris.sunbelt-software.com/read/my_forums/
> > or send an email to listmana...@lyris.sunbeltsoftware.com
> > with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <
> http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <
> http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to