Jeremiah Grossman, CTO and Founder of WhiteHat Security, comments: "Java is definitely a cesspool of vulnerabilities waiting to be discovered, some of which will be patched and exploited. The thing to closely monitor is how fast end-users are actually patching, not just how many vulnerabilities are being addressed when the patch is made available. The Java ecosystem is notoriously slow, which is why I recommend uninstalling Java unless you really need it, then you don't have to worry about the endless slew of patches."
Ross Barrett, senior manager of security engineering at Rapid7, comments: "Of today’s 40 fixes in Oracle’s Java SE CPU, 37 are remotely exploitable. The majority are vulnerable through browser plugins, 11 of which are exploitable for complete control of the underlying operating system.
The latest versions of Java 7, 6 and 5 are all vulnerable to most of these conditions. It’s highly likely that earlier versions are also vulnerable.
Java servers are affected by 4 of the disclosed issues, the worst of which scores a CVSS score of 7.5 out of 10 in terms of base risk.
The recommendation here, as always, is for all users to patch as quickly as possible. There are a good number of researchers that have been credited for these fixes and it’s likely that Proof of Concept code will be released now that that patches are available."
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.