I have a roaming profile and am unable to find the files referenced at that site, grr
-----Original Message----- From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Thursday, August 30, 2012 11:57 AM To: NT System Admin Issues Subject: RE: Oracle Quietly Releases Fix For Serious Java Security Bug For those doing the silent installs I just tested this one and the silent install works fine. MSIEXEC /I "jre1.7.0_07-c.msi" /qn /norestart /log "setup.log" You can extract the .msi using the instructions from the following site: http://www.scriptingsimon.com/2010/10/installing-java-silently/ Z Edward E. Ziots, CISSP, Security +, Network + Security Engineer Lifespan Organization ezi...@lifespan.org -----Original Message----- From: David Lum [mailto:david....@nwea.org] Sent: Thursday, August 30, 2012 2:47 PM To: NT System Admin Issues Subject: Oracle Quietly Releases Fix For Serious Java Security Bug http://www.forbes.com/sites/andygreenberg/2012/08/30/oracle-quietly-rele ases-fix-for-serious-java-security-bug-months-after-it-was-reported/ Dave -----Original Message----- From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Thursday, August 30, 2012 11:31 AM To: NT System Admin Issues Subject: RE: 0 Day in Java 1.7 up to Version 6 http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-18 35715.html?printOnly=1 Oracle Security Alert for CVE-2012-4681 Description This Security Alert addresses security issues CVE-2012-4681 (US-CERT Alert TA12-240A) and two other vulnerabilities affecting Java running in web browsers on desktops. These vulnerabilities are not applicable to Java running on servers or standalone Java desktop applications. They also do not affect Oracle server-based software. These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password. To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages this vulnerability. Successful exploits can impact the availability, integrity, and confidentiality of the user's system. In addition, this Security Alert includes a security-in-depth fix in the AWT subcomponent of the Java Runtime Environment. Due to the severity of these vulnerabilities, the public disclosure of technical details and the reported exploitation of CVE-2012-4681 "in the wild," Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible. Supported Products Affected Security vulnerabilities addressed by this Security Alert affect the products listed in the categories below. Please click on the link in the Patch Availability column or in the Patch Availability Table to access the documentation for those patches. Affected product releases and versions: Java SE Patch Availability JDK and JRE 7 Update 6 and before Java SE JDK and JRE 6 Update 34 and before Java SE Patch Availability Table and Risk Matrix Java SE fixes in this Security Alert are cumulative; this latest update includes all fixes from previous Critical Patch Updates and Security Alerts. Patch Availability Table Product Group Risk Matrix Patch Availability and Installation Information Oracle Java SE Oracle JDK and JRE Risk Matrix Oracle Security Alert for CVE-2012-4681 My Oracle Support Note 1486726.1. Developers can download the latest Java SE JDK and JRE 7 and 6 releases fromhttp://www.oracle.com/technetwork/java/ja vase/downloads/index.html. Users running Java SE with a browser can download the latest JRE 7 release fromhttp://java.com/. Users on the Windows platform can also use automatic updates to get the latest JRE 7 and 6 releases. Credit Statement The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle: Adam Gowdiak of Security Explorations; and James Forshaw (tyranid) via TippingPoint. References Oracle Critical Patch Updates and Security Alerts main page [ Oracle Technology Network ] Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions [ CPU FAQ ] Risk Matrix definitions [ Risk Matrix Definitions ] Use of Common Vulnerability Scoring System (CVSS) by Oracle [ Oracle CVSS Scoring ] English text version of risk matrix [ Oracle Technology Network ] CVRF XML version of the risk matrix [ Oracle Technology Network ] Previous Security Advisories for Java SE and Java for Business Security Updates [ Java Sun Alerts Archive Page ] Modification History Date Comments 2012-August-30 Rev 1. Initial Release Fire up the Patch Machine, its time again... Z Edward E. Ziots, CISSP, Security +, Network + Security Engineer Lifespan Organization ezi...@lifespan.org -----Original Message----- From: S Powell [mailto:powe...@gmail.com] Sent: Thursday, August 30, 2012 2:16 PM To: NT System Admin Issues Subject: Re: 0 Day in Java 1.7 up to Version 6 according to cert: http://www.kb.cert.org/vuls/id/636312 "This issue is addressed in Java 7 Update 7. Also consider the following workarounds:" so I guess the real question is, is it really patched? ----------------- "Choose the highest bidder" was my answer when they told me I was up for sale. On Thu, Aug 30, 2012 at 11:03 AM, David Lum <david....@nwea.org> wrote: > "After an exploit for them has been added to the Blackhole exploit kit, the number of sites functioning as entrance points for malware has risen exponentially. According to Patrik Runald, director of security research at Websense, the company has already spotted over 100 unique domains serving the Java exploit. > > "The number is definitely growing...and because Blackhole has an updatable framework and already has a foothold on thousands of sites, we anticipate that the number of sites compromised with this new zero-day will escalate rapidly in the coming days," he told Gregg Keizer." > > - and - > > "According to researchers from Security Explorations, who found the two flaws and reported them to Oracle back in April, the monthly status report they received from Oracle less than a week ago shows that both flaws have been addressed." > > Full article: http://www.net-security.org/secworld.php?id=13507 > > David Lum > Systems Engineer // NWEATM > Office 503.548.5229 // Cell (voice/text) 503.267.9764 > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin