Oracle has released a patch for a major zero-day security flaw in Java which was reportedly being widely exploited by attackers.
The fixes include switching Java security settings to high by default, according to Oracle's Software Security Assurance Blog, requiring users to "expressly authorise the execution of of applets which are either unsigned or self-signed."
When visiting malicious websites, users will be notified before an applet is run and be able to deny execution of a potentially dangerous one. Oracle said this will prevent so-called drive-by attacks where users' systems are infected without their knowledge.
Oracle recommended users apply the fixes as soon as possible. The security flaws that were reported to the company in August and September last year are being exploited in the wild.
The vulnerabilities affect all versions of Java 7 and not server, desktop apps or embedded variants.
However, the United States National Vulnerability Database advises that versions 4 to 7 are all vulnerable to the security hole.
Both Apple and Mozilla have taken steps to protect their users against attacks.
Mozilla has enabled Click To Play for recent versions of Java, which means the plug-in won't load unless users expressly click to enable it, and Apple last week rolled out a malware definition that blocks the Java plug-in for OS X, according to Mac Rumours.
Last year Apple OS X users were hit by an earlier Java security hole that saw over 600,000 Macs being hijacked and utilised in a botnet.
Copyright © iTnews.com.au . All rights reserved.
Issue: 340 | July 2015