After Java 7 was fixed, a new vulnerability was discovered.

Source: Internet
Author: User

Some experts suggested that the user return to Java 6, because the 0Day vulnerabilities only affect Java 7, while Java 6 update 35 updated in August is only for error correction, there are no security issues.

Adam Gowdiak, Chief Executive Officer of Security configurations, a Polish Security company that found a Java 7 vulnerability in April this year, emailed the media that Oracle released the Java 7 patch in 8/30, they only took two or three hours to identify the vulnerability that evening. This vulnerability is the same as the one used in the previous 0-day attack. It can completely get rid of the Java sandbox protection mechanism and may cause hackers to control the Java User computer.

To prevent hackers from exploiting this vulnerability, Security advisations did not disclose information about the vulnerability before Oracle fixed the vulnerability, however, the company still recommends that you Uninstall Java 7 or disable it in a browser before Oracle fixes the vulnerability.

Oracle had previously scheduled release of regular updates in May, but it did not mention the next release of updated information after an exception was made last week. The latest updates released by Oracle did not even fix the 29 vulnerabilities proposed by Security configurations in April.

In the response of readers in various media, many users indicate that removing Java will affect the software used in daily jobs.

Some experts suggested that the user return to Java 6, because the 0Day vulnerabilities only affect Java 7, while Java 6 update 35 updated in August is only for error correction, there are no security issues.

For Mac users, Leopard (10.5) or Snow Leopard (10.6) can only use Java 6, while Lion (10.7) and Mountain Lion (10.8) you can also refer to the methods provided by Oracle to switch to Java 6.

Adam Gowdiak also told the media that they were surprised that Java 7 was so easy to be attacked, while Java 6 only found vulnerabilities that could bypass sandbox control in the Quicktime function.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.