• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • New Java Vulnerabilities No Threat To IBM i

    January 23, 2013 Alex Woodie

    The Java vulnerabilities that hackers have been exploiting on computers around the world do not exist on the implementation of Java that IBM runs on its IBM i platform, IBM officials confirmed last week.

    “IBM has confirmed that the IBM Java Software Development Kit (SDK) and IBM Java Runtime Environment (JRE) are not vulnerable to this reported exploit,” spokesperson Kristin Bryson, of IBM’s Systems and Technology Group, told IT Jungle via email. “The IBM version of Java (which is used on IBM i) has been tested for this issue and it is not in the IBM version of Java.”

    The Java vulnerabilities took the IT security world by storm after hackers began exploiting the flaws before Oracle could issue a patch. The ready availability of exploit kits and the slow response from Oracle led the federal government to recommend that computer users protect themselves by removing Java from their systems. The new security flaws in Java are isolated to the Web browser and don’t impact server implementations of Java, IBM said.

    It all started on January 10, when CERT issued a security alert warning about a zero-day vulnerability (CVE-2013-0422) in version 7 update 10 of the Java Development Kit (JDK) that was being actively exploited. The vulnerability, which actually involved multiple vulnerabilities, resulted in hackers being able to run arbitrary code on affected systems.

    On January 13, Oracle responded to the so-called “Security Manager Bypass Vulnerability” with JDK version 7 update 11. The software giant encouraged users to apply the update to their JREs “as soon as possible” to avoid falling victim to the flaw, which requires users to visit a maliciously crafted website.

    In addition to addressing CVE-2013_0422, Oracle also addressed another critical Java vulnerability called CVE-2012-3174 that allows hackers to take full control of victims’ computers. The details of this second vulnerability have not been disclosed, according to CERT, but it carries the same severity level–10.0 on a scale of 1 to 10. Oracle says in its security alert for CVE-2013-0422 that it also fixes CVE-2012-3174.

    Although the underlying flaw exists in the JDK, it appears that Oracle’s Java implementation–its Java Runtime Environment (JRE) version 1.7–is the one mainly affected by these vulnerabilities. Oracle’s JRE has been ported to multiple systems, including Windows, OS/X, and Linux systems. Oracle’s JRE is arguably the world’s most popular Java environment. But dozens of other software vendors, including IBM, Hewlett-Packard, SAP, and Microsoft, also develop JVMs (Microsoft discontinued its JVM in 2011).

    IBM stopped using Sun Microsystems’ tools to develop its Java Virtual Machine (JVM) and JREs (a JRE is composed of a JVM and Java class libraries) with the launch of IBM i 7.1 in 2010. That was the year that IBM stopped supporting the “classic” 64-bit JVM for i5/OS that was originally developed with Sun’s tools. Taking place of the classic 64-bit JVM were two other “J9” JVMs (one 32 bit and one 64 bit) that IBM wrote using its own IBM Technology for Java (IT4J) tooling. These JVMs support JDK version 1.7 and earlier, and are used, basically unchanged, across IBM’s complete line of IBM i, AIX, Linux, and Windows servers.

    This article was corrected. IBM did not recently issue a patch for a Java vulnerability, CVE-2010-4476. It actually patched that flaw when it was discovered in February 2011. IT Jungle regrets the error.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Mainline Buys BI Services Firm Coming Soon: Entry And Midrange Power7+ Servers

    Leave a Reply Cancel reply

Volume 23, Number 3 -- January 21, 2013
THIS ISSUE SPONSORED BY:

Infinite Corporation
Bug Busters Software Engineering
Linoma Software
HiT Software
RJS Software Systems

Table of Contents

  • New Java Vulnerabilities No Threat To IBM i
  • IBM Taps Ingram Micro, Tech Data To Peddle Power Systems, Storage
  • Steve Will Keeps His i On The Prize
  • Mad Dog 21/21: Google Evildoers Filched Funds From My Wallet
  • IBM Doubles Up Rebates On Power Systems Trade-In Deal
  • IBM: I Have Seen the Future And It Works
  • IBM Europe Gives Rebates To Power Resellers Who Push ISV Wares
  • Data Skills Crashes Dice Top Five Hiring Demands
  • SAP Profits From HANA Appliance, Cloud, And Plain Old Software
  • Steampunk Will Be The Next Big Rage, So Saith IBM

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Power11 Transistor Count Discrepancies Explained – Sort Of
  • Is Your IBM i HA/DR Actually Tested – Or Just Installed?
  • Big Blue Delivers IBM i Customer Requests In ACS Update
  • New DbToo SDK Hooks RPG And Db2 For i To External Services
  • IBM i PTF Guide, Volume 27, Number 33
  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle