• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Sun Patches Security Holes in Java Runtime Environment

    January 22, 2007 Timothy Prickett Morgan

    The past few weeks have been busy ones for patching security holes in the Java Runtime Environment that is at the heart of Sun Microsystems‘ Java programming language. Several vulnerability alerts for the JRE and the Java Development Kit (JDK) were issued the day after Christmas, and one more was issued on January 17.

    If you want to find the details about these security vulnerabilities, go to the National Institute of Standards and Technology’s National Vulnerability Database and search for “JRE.” The alert posted on January 17 said that Sun JDK and JRE 5.0 Update 9 and earlier releases had a hole that would allow malicious Java applets to gain privileges on machines through a corrupted GIF image file, which would trigger a memory corruption (a buffer overflow) that could in turn allow a malicious coder into a machine. A spate of warnings issued on December 26 for earlier JDKs and JREs had similar security holes.

    According to security monitoring site Secunia, these security holes have been patched by Sun, and they were rated highly critical security flaws. Sun fixed the flaws by issuing updates for the JRE 1.3, 1.4, and 5.0 software. You can read Sun’s own advisory on this issue here. Sun has patched Java for Windows, Linux, and Solaris platforms, which it supports with its own JDK and JRE software.

    Because IBM creates its own JDK and JRE software, Sun’s patches do not work on IBM’s own operating systems. I bring this up merely so you know there is a potential problem so you can ask IBM what you need to do. Keep your eyes on the System i PTF Guide, which is brought to you by our good friends at DLB Associates, to find out if and when IBM makes its own patches for this GIF-related Java security hole. As of Sunday afternoon, January 21, there was nothing yet.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 3 -- January 22, 2007

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Ending Subsystems Properly IBM Lotus Adds Handles to Information Overload

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 3

This Issue Sponsored By

    Table of Contents

    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Sun Patches Security Holes in Java Runtime Environment
    • Study Weighs Building Data Centers Against Colocation for SMBs
    • Security Experts Say Botnets, Web Extortion Threats on the Rise
    • New Congress, AT&T Revive the Net Neutrality Issue
    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Ask TPM: The Economics of Open Source Software
    • Zend Describes Multiple Instances on i5/OS, Previews RPG Wrapper
    • IBM Closes Out 2006 With a Strong Fourth Quarter
    • Big Blue Readies Revamped Storage for the System i

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Big Blue Raises IBM i License Transfer Fees, Other Prices
    • Keep The IBM i Youth Movement Going With More Training, Better Tools
    • Remain Begins Migrating DevOps Tools To VS Code
    • IBM Readies LTO-10 Tape Drives And Libraries
    • IBM i PTF Guide, Volume 27, Number 23
    • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
    • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
    • RPG Code Generation And The Agentic Future Of IBM i
    • A Bunch Of IBM i-Power Systems Things To Be Aware Of
    • IBM i PTF Guide, Volume 27, Numbers 21 And 22

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle