Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
Open Source: Shrinking the Trust Surface
 
Open-Source: How Trustworthy, How Secure?
 
Trustworthy Software Security: How Do We Get There...
 
Zombie Planet: Spam and Phish Egg Harvesting
 
Lost in Twisty Overlays All the Same: Peer Pressur...
 
To Engineer is to Tinker?
 
A Feed Too Far
 
Security is a Programming Problem?
 
Ending the Madness: Deja Triple Vu
 
Your%20Message%20Here

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2004-10-28

 

Uh Oh: Time to Refresh Java

F-Secure : New Java Applet Trojan.  2004-09-21: I've been slugging away building a Java development setup for the great Numbering Peano escapade.  One part of demonstrating the grounding of code includes providing an account of the tools I used and the version of Java (J2SE 1.4.1 SDK 1.4.1_02) that you can confirm my tests with.  I already knew that this build isn't supported any longer, and I was going to refresh anyhow as part of my XPSP2 upgrade, but now I've got a new problem:  Security exploit against the Sun Java Runtime.  Yippy Skippy.  OK, after I send in my proposal to commence my M.Sc in IT Dissertation Project, I will do a refresh to the nearest higher-numbered release that doesn't have this flaw and reconfirm the little bit of code that I am using so far. The Sun Alert Notification is one year old, and the apparent reason that F-Secure mentions it now is because there is an exploit in the wild.  Dangnabit. Then I need to check other Java Security Bulletins to see what else there is to upgrade beyond.  Ah hah.  Okey dokey.

It looks like I need to be at 1.4.2_05 at least

Java Runtime Environment May Allow Untrusted Applets to Escalate Privileges.  2004-09-21: Well, here's another vulnerability, in J2SE 1.4.2_04 and earlier (and some 1.4.1 and 1.4.0 builds too), so I might as well move higher.  According to the 2004-08-02 bulletin, the safe move is upgraded t0 1.4.2_05.  We'll just have to see about that.  And now that I have delayed putting these clippings in my face where it will do some good, I must remember to get the latest information, again before I download updates.  Oh, woe is me ...
 
Yes, I do have a backlog of draft postings!  This old one is here because it looked like the simplest thing I could do to force refresh with a new template that removes an annoyance (for me) and also tries out the rating system that NewsGator Online has introduced.
 
 
Well, no, 1.4.2_05 isn't safe either. It is necessary to move up to 1.4.2_06 according to http://jouko.iki.fi/adv/javaplugin.html which reports a vulnerability discovered before April 29 and now repaired.
 

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $