• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Sun Patches Security Holes in Java Runtime Environment

    January 22, 2007 Timothy Prickett Morgan

    The past few weeks have been busy ones for patching security holes in the Java Runtime Environment that is at the heart of Sun Microsystems‘ Java programming language. Several vulnerability alerts for the JRE and the Java Development Kit (JDK) were issued the day after Christmas, and one more was issued on January 17.

    If you want to find the details about these security vulnerabilities, go to the National Institute of Standards and Technology’s National Vulnerability Database and search for “JRE.” The alert posted on January 17 said that Sun JDK and JRE 5.0 Update 9 and earlier releases had a hole that would allow malicious Java applets to gain privileges on machines through a corrupted GIF image file, which would trigger a memory corruption (a buffer overflow) that could in turn allow a malicious coder into a machine. A spate of warnings issued on December 26 for earlier JDKs and JREs had similar security holes.

    According to security monitoring site Secunia, these security holes have been patched by Sun, and they were rated highly critical security flaws. Sun fixed the flaws by issuing updates for the JRE 1.3, 1.4, and 5.0 software. You can read Sun’s own advisory on this issue here. Sun has patched Java for Windows, Linux, and Solaris platforms, which it supports with its own JDK and JRE software.

    Because IBM creates its own JDK and JRE software, Sun’s patches do not work on IBM’s own operating systems. I bring this up merely so you know there is a potential problem so you can ask IBM what you need to do. Keep your eyes on the System i PTF Guide, which is brought to you by our good friends at DLB Associates, to find out if and when IBM makes its own patches for this GIF-related Java security hole. As of Sunday afternoon, January 21, there was nothing yet.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 3 -- January 22, 2007

    Sponsored by
    Rocket Software

    Disrupt Without Disruption

    For over 35 years, Rocket Software’s solutions have empowered businesses to modernize their infrastructure, unlock data value, and drive transformation – all while ensuring modernization without disruption.

    Learn How

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Ending Subsystems Properly IBM Lotus Adds Handles to Information Overload

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 3

This Issue Sponsored By

    Table of Contents

    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Sun Patches Security Holes in Java Runtime Environment
    • Study Weighs Building Data Centers Against Colocation for SMBs
    • Security Experts Say Botnets, Web Extortion Threats on the Rise
    • New Congress, AT&T Revive the Net Neutrality Issue
    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Ask TPM: The Economics of Open Source Software
    • Zend Describes Multiple Instances on i5/OS, Previews RPG Wrapper
    • IBM Closes Out 2006 With a Strong Fourth Quarter
    • Big Blue Readies Revamped Storage for the System i

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • To Comfort The Afflicted And Afflict The Comfortable
    • How FalconStor Is Reinventing Itself, And Why IBM Noticed
    • Guru: When Procedure Driven RPG Really Works
    • Vendors Fill In The Gaps With IBM’s New MFA Solution
    • IBM i PTF Guide, Volume 27, Number 27
    • With Power11, Power Systems “Go To Eleven”
    • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
    • Izzi Buys CNX, Eyes Valence Port To System Z
    • IBM i Shops “Attacking” Security Concerns, Study Shows
    • IBM i PTF Guide, Volume 27, Number 26

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle