Oracle released 40 new Java security fixes. 37 of the vulnerabilities may be remotely exploitable without authentication. This was described as the possibility of being exploited over a network without the need for a username and password.
Jeremiah Grossman, CTO and Founder of WhiteHat Security, comments: “Java is definitely a cesspool of vulnerabilities waiting to be discovered, some of which will be patched and exploited. The thing to closely monitor is how fast end-users are actually patching, not just how many vulnerabilities are being addressed when the patch is made available. The Java ecosystem is notoriously slow, which is why I recommend uninstalling Java unless you really need it, then you don’t have to worry about the endless slew of patches.”
Ross Barrett, senior manager of security engineering at Rapid7, comments: “Of today’s 40 fixes in Oracle’s Java SE CPU, 37 are remotely exploitable. The majority are vulnerable through browser plugins, 11 of which are exploitable for complete control of the underlying operating system.
The latest versions of Java 7, 6 and 5 are all vulnerable to most of these conditions. It’s highly likely that earlier versions are also vulnerable.
Java servers are affected by 4 of the disclosed issues, the worst of which scores a CVSS score of 7.5 out of 10 in terms of base risk.
The recommendation here, as always, is for all users to patch as quickly as possible. There are a good number of researchers that have been credited for these fixes and it’s likely that Proof of Concept code will be released now that that patches are available.”