If you are not a tech geek, just go to this website and run the online installation to safeguard your computers. Just click http://www.java.com/en/download/installed.jsp this site will verify your installation and check if you need a latest updated version/or not.
—Geek start here—-
Sun Java JRE vulnerable to arbitrary code execution via an undetermined error
Sun Java JRE vulnerable to privilege escalation
Sun Java JRE vulnerable to arbitrary code execution via an unspecified error
Sun Microsystems Java GIF image processing buffer overflow
- Sun Java Runtime Environment versions
- JDK and JRE 5.0 Update 9 and earlier
- SDK and JRE 1.4.2_12 and earlier
- SDK and JRE 1.3.1_18 and earlier
The Sun Java Runtime Environment contains multiple vulnerabilities that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
The Sun Java Runtime Environment (JRE) allows users to run Java applications in a browser or as standalone programs. Sun has released updates to the Java Runtime Environment software to address multiple vulnerabilities. Further details about these vulnerabilities are available in the Vulnerability Notes Database.
Note that exploit code is publicly available for at least one of these vulnerabilities.
By convincing a user to run a specially crafted Java application, a remote, unauthenticated attacker can execute arbitrary code on a vulnerable system. A common attack vector would be a web page that contains a Java applet.
Apply an update from Sun
These issues are addressed in the following versions of the Sun Java Runtime environment:
JDK and JRE 5.0 Update 10 or later
SDK and JRE 1.4.2_13 or later
SDK and JRE 1.3.1_19 or later
If you install the latest version of Java, older versions of Java may remain installed on your computer. If these versions of Java are not needed, you may wish to remove them. For instructions on how to remove older versions of Java, refer to the following instructions from Sun.
Disable Java in your web browser, as specified in the Securing Your Web Browser document. While this does not fix the underlying vulnerabilities, it does block the most common attack vector.
—Geek end here—-