Oracle Releases emergency Java security updates to fix a critical vulnerability
Oracle has released an emergency Java security update that fixes a critical vulnerability (CVE-2016-0636, CNNVD-201603-377 ).
Vulnerability Overview
Oracle responds so quickly because the vulnerability can be easily exploited and details of the vulnerability have been disclosed. (Oracle is wise not to point out the location where the code is exposed)
The exploitation of this vulnerability is widely used in the penetration code toolkit, which is only a matter of time. Therefore, the vendor recommends that you upgrade the vulnerability as soon as possible.
"Unauthenticated attackers can exploit this vulnerability remotely and even launch attacks on the network without the need for usernames and passwords ." Oracle said in the Security Bulletin.
"To successfully exploit this vulnerability, you need to run the affected version in the browser to access malicious web pages. This vulnerability affects the confidentiality, integrity, and availability of your system ."
Affected Versions
This vulnerability affects Java SE running in Web browsers-Java SE 7 Update 97,8 Update 73,74 Based on Windows, Solaris, Linux, and Mac OS platforms, rather than Java deployment that loads and runs trusted code.
Mitigation
If you are not sure whether Java is installed on your computer, you can use a Web tool for detection. In addition, once the user completes the upgrade (obtain the address), you must ensure that all old Java versions are uninstalled on the device.
The next key patch update of JavaSE is scheduled to be released on July 15, April 19, 2016.
Oracle has released an emergency Java security update that fixes a critical vulnerability (CVE-2016-0636, CNNVD-201603-377 ).
Vulnerability Overview
Oracle responds so quickly because the vulnerability can be easily exploited and details of the vulnerability have been disclosed. (Oracle is wise not to point out the location where the code is exposed)
The exploitation of this vulnerability is widely used in the penetration code toolkit, which is only a matter of time. Therefore, the vendor recommends that you upgrade the vulnerability as soon as possible.
"Unauthenticated attackers can exploit this vulnerability remotely and even launch attacks on the network without the need for usernames and passwords ." Oracle said in the Security Bulletin.
"To successfully exploit this vulnerability, you need to run the affected version in the browser to access malicious web pages. This vulnerability affects the confidentiality, integrity, and availability of your system ."
Affected Versions
This vulnerability affects Java SE running in Web browsers-Java SE 7 Update 97,8 Update 73,74 Based on Windows, Solaris, Linux, and Mac OS platforms, rather than Java deployment that loads and runs trusted code.
Mitigation
If you are not sure whether Java is installed on your computer, you can use a Web tool for detection. In addition, once the user completes the upgrade (obtain the address), you must ensure that all old Java versions are uninstalled on the device.
The next key patch update of JavaSE is scheduled to be released on July 15, April 19, 2016.