Oracle on Tuesday released 127 security fixes for its products, including 51 patches for Java, as part of its quarterly critical patch update (CPU).
"Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible," according to the distribution page for the fixes.
Vulnerabilities detailed in the security bulletin affect all versions of Java (versions 5, 6 and 7), as well as Oracle Database 11g and 12c, Fusion Middleware, Enterprise Manager, E-Business Suite, Flexcube Products Suite, Oracle's Health Sciences and Retail Products suites, Primavera, PeopleSoft, Siebel and MySQL.
While Oracle's critical patch update fixes only recent versions of many of those programs, the company said that older, unsupported versions may have the same bugs. "It is likely that earlier versions of affected releases are also affected by these vulnerabilities," Oracle said. "As a result, customers are recommended to upgrade to supported versions."
[ For more Oracle news, see Oracle OpenWorld: 5 Rants And Raves . ]
Which bugs should information security managers squash first? "All of these updates are important, but arguably Java is the most important of all of them," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.
Indeed, of the 51 Java patches, 50 involve remotely exploitable vulnerabilities, and an equal number of flaws affect Java applets or Java WebStart, which allows Java apps to be run from the browser. Finally, 12 of the Java bugs score a "10" on the CVSSv2 vulnerability index, meaning they can be remotely exploited by an attacker to seize full control of a PC.
The Java vulnerabilities affect both client-side and server-side Java. "The majority of vulnerabilities are concentrated on the Java client side, i.e. in desktop/laptop deployments, with the most common attack vector being Web browsing and malicious Web pages," said Wolfgang Kandek, CTO of Qualys, in a blog post. "But there are two highly critical vulnerabilities that also apply to server installations -- CVE-2013-5782 and CVE-2013-5830."
Java 7 update 45 is now the latest version of the software. "You should update as quickly as possible on your desktop and laptop machines," said Kandek.
For people still using Java 6 -- or any prior version -- the security advice is to upgrade immediately, or else take steps to safeguard the machine, especially since related attacks will no doubt start soon. "Java 6 is also vulnerable to 11 of the 12 highly critical vulnerabilities, but there are no more public patches for Java 6," Kandek said. "The recommended action for Java 6 here is to upgrade to Java 7, if possible. If you cannot upgrade, I would recommend [that you] isolate the machine that needs Java 6 running and not use it for any other activities that connect it to the Internet, such as e-mail and browsing."
The Java 7 patches are good news for businesses and consumers that still rely on the Web browser plug-in, and Wisniewski at Sophos lauded Oracle's decision to patch all of its products -- including Java -- at the same time. "This is the first time Oracle is patching Java on the same quarterly cycle as other products, and perhaps the first time I have had something positive to say about Oracle security," he said.
On that note, however, he also argued that Oracle still has a long way to go to get its security house in order, despite the company having already delayed the release of Java 8 in April to dedicate more resources on improving Java 7 security.
"I heard that Oracle won the America's Cup recently which leads me to give them some unsolicited advice," said Wisniewski. "Put the award on the shelf in your lobby, sell the $10 million dollar boat and hire the engineers needed to update the Java patch cycle to monthly with the spare cash. Three-plus billion devices will thank you."
Oracle's next quarterly patch update is scheduled for January 14, 2014.