Oracle pushes patch for Java vulnerability after exploit reports surface

Oracle on Monday shipped another update to its widely deployed Java software to close two vulnerabilities, one of which is being used by attackers in active exploits.

The update for Java SE 5, 6 and 7 running in web browsers addresses a pair of flaws – CVE-2013-0809 and CVE-2013-1493. The latter bug is being actively leveraged in attacks to spread the McRAT executable, researchers from network security company FireEye revealed Thursday.

Oracle apparently was able to distribute a fix so quickly because it actually learned of this vulnerability on Feb. 1, but wasn't able to include a patch in the Feb. 19 update to Java. So, it had planned to plug the hole in its next scheduled Java update, set for April 16, but given the exploit reports, it rushed a patch for the vulnerability, as well as a "closely related bug," as part of an out-of-band update, Eric Maurice, director of Oracle software security assurance, wrote in a blog post Monday.

Both vulnerabilities were assigned 10.0 scores on the Common Vulnerability Scoring System, the highest mark.

Maurice added that Oracle recently changed Java's security settings to "high" by default, meaning users are now prompted whether to install an applet that is unsigned or self-signed.

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.