Minor Java Security Flaw Posing to be a Huge Threat
Java Runtime and Java Sandbox are two main things that companies cannot afford to see as compromised. What was earlier thought to be a new upgrade to Java SDK and Java server side machines, is now posing to be a huge security threat with potentially widespread repercussions.
If not handled on time, the latest security flaw in Java SE5 Ver. 1.5.0 22-B03, Java SE7 1.7.0-B10 and Java SE6 1.6.0 35B10 can cause Java machine to run with a couple of discrepancies on its back end. The interesting thing is that despite of three different version releases, the company developers haven’t been able to completely handle the security bug, hence allowing hackers to completely bypass the system security.
According to ethical hackers at ‘Security Explorations’, the new security bugs were exposed using Windows 7 OS and several different browsers, such as Opera, Chrome and Firefox. According to the experts at ‘Security Explorations’ the security exploit was discovered through the latest version of the Java Plugin for public.
How Does it Affect Normal Computer Users?
For starters, if you are using Windows 7 32-b edition, there is a 100% possibility for Java oriented hackers to access your system. Same goes for Linux, Max and Solaris installed machines where the above mentioned versions of Java are being used commonly. CEO or ‘Security Explorations’, Adam Gowdiak has made it very clear in the company’s blog post that Oracle was recently alerted to overcome this issue as soon as possible.
As a normal computer user who doesn’t have anything to hide, you don’t have much to worry about. However, if you are running a company, a network of any category or a large scale business, the latest combination of Windows 7 32b and Java Plugin can ruin your entire set up. Not to mention the fact that sensitive company information regarding financials can also be accessed easily as part of the exploit’s side effect.
At the same time, Gowdiak has also reassured that there is no solid evidence of this bug being used as a malware spreading activity. But one cannot overlook the possibility of reducing the overall number of active runtime commands and code execution as long as the Java environment is being handled by Oracle itself.
Stay tuned for another Java upgrade. Let’s hope that the issue is resolved this time.