Oracle has released a patch for a major zero-day security flaw in Java which was reportedly being widely exploited by attackers.
The fixes include switching Java security settings to high by default, according to Oracle's Software Security Assurance Blog, requiring users to "expressly authorise the execution of of applets which are either unsigned or self-signed."
When visiting malicious websites, users will be notified before an applet is run and be able to deny execution of a potentially dangerous one. Oracle said this will prevent so-called drive-by attacks where users' systems are infected without their knowledge.
Oracle recommended users apply the fixes as soon as possible. The security flaws that were reported to the company in August and September last year are being exploited in the wild.
The vulnerabilities affect all versions of Java 7 and not server, desktop apps or embedded variants.
However, the United States National Vulnerability Database advises that versions 4 to 7 are all vulnerable to the security hole.
Both Apple and Mozilla have taken steps to protect their users against attacks.
Mozilla has enabled Click To Play for recent versions of Java, which means the plug-in won't load unless users expressly click to enable it, and Apple last week rolled out a malware definition that blocks the Java plug-in for OS X, according to Mac Rumours.
Last year Apple OS X users were hit by an earlier Java security hole that saw over 600,000 Macs being hijacked and utilised in a botnet.
Copyright © iTnews.com.au . All rights reserved.
Issue: 334 | December 2014
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.