Submitted by admin on

WHAT'S HAPPENING?
Java 7 update 10 and earlier contain a vulnerability that is being actively exploited.
 
 
WHY IS IT HAPPENING?
Exploit code has been released which targets a vulnerability in Java 7 version 10 and earlier. Further details regarding this vulnerability are available at the following URL's:
 
http://news.cnet.com/8301-1009_3-57563730-83/oracle-releases-software-update-to-fix-java-vulnerability/
http://thenextweb.com/apps/2013/01/12/oracle-confirms-latest-java-7-vulnerability-and-announces-a-fix-will-be-available-shortly/
 
 
WHO IS AFFECTED?
Users of self-managed desktops, laptops, and servers running an affected version of Java 7.  Javascript is not affected by this exploit.  TSO has standardized on Java 6 on its managed machines, which is not vulnerable to this exploit.  If you're unsure if you're using a managed machine, please contact the TSO Help Desk.
 
 
WHAT DO YOU NEED TO DO?
Affected users should check to see if they're running a vulnerable version of Java; there may be multiple versions installed.  If there is a vulnerable version installed, users should visit the URL below to patch or, if Java is not needed, uninstall Java.  
 
http://www.oracle.com/technetwork/java/javase/downloads/index.html
 
 
WHO SHOULD YOU CONTACT FOR QUESTIONS?
The TSO Help Desk (CCB 148, 404-894-7065, helpdesk@cc.gatech.edu).