BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

JRE 6 automatic upgrade to JRE 7, coming soon

Post by BeyondTrust Research Team December 19, 2012

Starting this month, Oracle will be automatically replacing Java Runtime Environment (JRE) 6 installations with JRE 7 installations on a small amount of users’ systems (the users are randomly chosen). This will be done to ensure that the automatic upgrading mechanism is working properly. In February 2013, the last public version of JRE 6 (Java SE 6 Update 39) will be made available.

So what does this mean to you?
It means attackers will have a harder time exploiting your system. Due to the fact that JRE 6 does not have Address Space Layout Randomization/Data Execution Protection (ASLR/DEP) support, many exploit writers use it to successfully compromise systems through browser-based exploits. Since JRE 7 utilizes ASLR/DEP, it takes away one of the handy tools that attackers use to compromise systems. The end result is that attackers will have fewer resources at their disposal as they attempt to exploit systems.

As always, we recommend using the latest version of software that is available, so this change is in line with our recommendations. If you are currently using JRE 6 and wish to upgrade, you can grab the latest version from Oracle’s Java download page.

Try Retina free.
Unsure if you are using a vulnerable version of Java or other applications? Download a free copy of our vulnerability management software Retina.

Tags:
, , , , , , ,

Leave a Reply

One Response to “JRE 6 automatic upgrade to JRE 7, coming soon”

  1. Java 7 0day actively exploited in the wild | BeyondTrust

    [...] Java, 7u10. It should be noted that while it only affects version 7, Java 6 users will be forced to automatically upgrade to version 7 in February of this year, which means that even more people will be exposed to this vulnerability [...]

    January 10, 2013 11:30:33, Reply

Additional articles

April VEF Participant Wins a Apple iPad mini

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao April 24, 2014
smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,