Sun warns of new security holes

Powered by SC Magazine
 

Sun is advising administrators to updater their software after a vulnerability was detected in the company's Java System Identity Manager software.

The company said that some nine issues within its indentity management offering would be resolved by the update.

Among the vulnerabilities patched by the flaw include the ability to intercept data transfers and remotely execute code with administrator rights.

Other vulnerabilities include multiple cross-site scripting flaws and a vulnerability which could potentially allow an unauthorised user to erase and overwrite passwords.

The update affects versions 7.0, 7.1, 7.1.1 and 8.0 of the Sun Java System Identity Manager software.

Version 8.1 is not believed to be affected by any of the vulnerabilities and administrators running those systems will not need to apply the patch. Sun said that administrators can check their version of the software by the "help" tab when in the software's administration console screen.

Other than applying the patch, the company did not list any further resolutions for the issues or suggestions on mitigating the risk from the vulnerabilities.

No other Sun products or components are affected by the update.


 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1071

Vote