Forum Thread: Another Java Zero-day

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:

This thread has been marked as locked.
mogs Another Java Zero-day
Expert Contributor 1st Mar, 2013 21:54
Ranking: 2265
Posts: 6,269
User Since: 22nd Apr, 2009
System Score: 100%
Location: UK

Disable Java, wait for patch, you all know the drill...
By Jack Clark in San Francisco Get more from this author
Posted in Security, 1st March 2013 18:55 GMT
A new Java zero-day vulnerability is being exploited by attackers, and until it is patched everyone should disable Java in their browser.

The vulnerability targets browsers that have the latest version of the Java plugin installed Java v1.6 Update 41 and Java v1.7 Update 15 malware researchers FireEye reported on Thursday.

It has been used to attack multiple customers, FireEye said.

"We urge users to disable Java in your browser until a patch has been released; alternatively, set your Java security settings to 'High' and do not execute any unknown Java applets outside of your organization," the researchers wrote.
Read more at :-


Maurice Joyce RE: Another Java Zero-day
Handling Contributor 5th Mar, 2013 11:19
Score: 11932
Posts: 9,157
User Since: 4th Jan 2009
System Score: N/A
Location: UK
After 33 days Oracle have now fixed the vulnerability outlined above.

The download link is here:

Once installed PSI should pick it up without a full rescan with version number

More details here on JAVA if required.


Windows 7 SP1 64 Bit OS
HP Intel Pentium i7
IE 11 for Windows 7 SP1
Was this reply relevant?

This thread has been marked as locked.