BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

JRE 6 automatic upgrade to JRE 7, coming soon

Posted December 19, 2012    BeyondTrust Research Team

Starting this month, Oracle will be automatically replacing Java Runtime Environment (JRE) 6 installations with JRE 7 installations on a small amount of users’ systems (the users are randomly chosen). This will be done to ensure that the automatic upgrading mechanism is working properly. In February 2013, the last public version of JRE 6 (Java SE 6 Update 39) will be made available.

So what does this mean to you?
It means attackers will have a harder time exploiting your system. Due to the fact that JRE 6 does not have Address Space Layout Randomization/Data Execution Protection (ASLR/DEP) support, many exploit writers use it to successfully compromise systems through browser-based exploits. Since JRE 7 utilizes ASLR/DEP, it takes away one of the handy tools that attackers use to compromise systems. The end result is that attackers will have fewer resources at their disposal as they attempt to exploit systems.

As always, we recommend using the latest version of software that is available, so this change is in line with our recommendations. If you are currently using JRE 6 and wish to upgrade, you can grab the latest version from Oracle’s Java download page.

Try Retina free.
Unsure if you are using a vulnerable version of Java or other applications? Download a free copy of our vulnerability management software Retina.

Tags:
, , , , , , ,

Leave a Reply

One Response to “JRE 6 automatic upgrade to JRE 7, coming soon”

  1. Java 7 0day actively exploited in the wild | BeyondTrust

    […] Java, 7u10. It should be noted that while it only affects version 7, Java 6 users will be forced to automatically upgrade to version 7 in February of this year, which means that even more people will be exposed to this vulnerability […]

    January 10, 2013 11:30:33, Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,