Apple yesterday released a Java update for Mac owners that fixes a dozen security flaws, including one that has been exploited by attackers for at least two weeks.
The update follows a decision Monday by Mozilla to blacklist unpatched editions of the Java plug-in from running in the Windows version of Firefox. Mozilla has yet not instituted a similar ban for Firefox on Mac OS X, however.
Apple classified all 12 of the Java vulnerabilities patched Tuesday as critical. Although the company does not use a threat scoring system to rate bug fixes, its use of the phrase "...may lead to arbitrary code execution," in its advisory describes the most serious kind of flaw that could be used by attackers to take control of a machine.
The update applies to Mac OS X 10.6, aka Snow Leopard, and OS X 10.7, better known as Lion.
While Apple no longer packages Oracle's Java with its Mac operating system -- it stopped that practice with Lion last July 2011 -- it continues to issue Java security updates to people running Lion as well as Snow Leopard. Java may have be on some Lion systems: Users are prompted to install the software the first time they try to run a Java applet.
Java is also present on Macs that have been upgraded to Lion from Snow Leopard.
One of the dozen vulnerabilities, identified as CVE-2012-0507, has been targeted by the Flashback clan of Trojan horses since at March 23, according to Mac-only security company Intego.
Oracle patched that Java vulnerability -- and 13 others -- for Windows, Linux and Unix on February 14, but because Apple still maintains Java on OS X.
Flashback.R exploits the CVE-2012-0507 Java bug and like earlier versions of the malware , can silently infect Mac users. The earlier Flashback.G, which Intego analyzed in late February, was the first Mac Trojan that didn't require any user interaction. Before Flashback.G, Mac malware needed help installing, if only getting the user to enter her administrative password.
Flashback.G exploited two different Java bugs, but both of them had been patched months or even years earlier. Flashback.R, as Intego called it, was the first to target an unpatched, or "zero-day," Java bug.
The seven-week stretch between Oracle's and Apple's Java updates wasn't lost on security researchers.
"Why Apple did not deploy these fixes before Mac users were victimized by criminals is unclear," said Chet Wisniewski, a security researcher with U.K.-based vendor Sophos, in a Wednesday blog . "Fortunately, once it became a problem the company responded quickly."
Mac users can determine whether their machines have Java installed by visiting one of several websites, including this one , or by launching Terminal from the Utilities subfolder within the Applications folder, then typing "java -version" without the quotation marks.
Sign up for CIO Asia eNewsletters.