• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Sun Patches Security Holes in Java Runtime Environment

    January 22, 2007 Timothy Prickett Morgan

    The past few weeks have been busy ones for patching security holes in the Java Runtime Environment that is at the heart of Sun Microsystems‘ Java programming language. Several vulnerability alerts for the JRE and the Java Development Kit (JDK) were issued the day after Christmas, and one more was issued on January 17.

    If you want to find the details about these security vulnerabilities, go to the National Institute of Standards and Technology’s National Vulnerability Database and search for “JRE.” The alert posted on January 17 said that Sun JDK and JRE 5.0 Update 9 and earlier releases had a hole that would allow malicious Java applets to gain privileges on machines through a corrupted GIF image file, which would trigger a memory corruption (a buffer overflow) that could in turn allow a malicious coder into a machine. A spate of warnings issued on December 26 for earlier JDKs and JREs had similar security holes.

    According to security monitoring site Secunia, these security holes have been patched by Sun, and they were rated highly critical security flaws. Sun fixed the flaws by issuing updates for the JRE 1.3, 1.4, and 5.0 software. You can read Sun’s own advisory on this issue here. Sun has patched Java for Windows, Linux, and Solaris platforms, which it supports with its own JDK and JRE software.

    Because IBM creates its own JDK and JRE software, Sun’s patches do not work on IBM’s own operating systems. I bring this up merely so you know there is a potential problem so you can ask IBM what you need to do. Keep your eyes on the System i PTF Guide, which is brought to you by our good friends at DLB Associates, to find out if and when IBM makes its own patches for this GIF-related Java security hole. As of Sunday afternoon, January 21, there was nothing yet.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 3 -- January 22, 2007

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Study Weighs Building Data Centers Against Colocation for SMBs Big Blue Readies Revamped Storage for the System i

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 3

This Issue Sponsored By

    Table of Contents

    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Sun Patches Security Holes in Java Runtime Environment
    • Study Weighs Building Data Centers Against Colocation for SMBs
    • Security Experts Say Botnets, Web Extortion Threats on the Rise
    • New Congress, AT&T Revive the Net Neutrality Issue
    • USPTO Elaborates on 2006’s Issued Patents and Backlog
    • Ask TPM: The Economics of Open Source Software
    • Zend Describes Multiple Instances on i5/OS, Previews RPG Wrapper
    • IBM Closes Out 2006 With a Strong Fourth Quarter
    • Big Blue Readies Revamped Storage for the System i

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Brace Yourself: Another Power Systems Price Hike Coming May 1
    • Updates Announced for IBM i BRMS And SMTP Email Client
    • AI Will Be Front And Center At POWERUp 2026 Next Week
    • IBM i PTF Guide, Volume 28, Number 16
    • Spring IBM i Tech Refreshes Will Come A Bit Later This Year
    • You Are Much More Than Power Systems, And So Are We
    • Startup Seeks The “Golden Path” for IBM i Modernization
    • What Can IBM Do To Make The Future Power S1112 Mini System Compelling?
    • IBM i PTF Guide, Volume 28, Number 15
    • Bob 1.0 Users Bugged By Lack Of One Feature

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle