The bug causes the Java runtime environment to hang when converting "2.2250738585072012e-308" to a binary floating-point number, according to the alert. "Successful attack of this vulnerability can result in unauthorised ability to cause a hang or frequently repeatable crash (complete Denial of Service) of the Java Runtime Environment," Oracle said. "Java based application and web servers are especially at risk from this vulnerability."
A number of products are affected by the bug, including Java SE and Java for Business. A full list and links to recommended patches has been posted on Oracle's website.
Oracle typically issues security patches for all affected products on a quarterly basis, although as in this case, it also releases fixes for bugs deemed too serious to wait for the next update.
The last quarterly update, which was posted in January, included more than 60 fixes. That doesn't seem like enough given the number of acquisitions Oracle has made in recent years, one security expert said at the time.
"In the past, when Oracle had far fewer products, they would patch 100 database vulnerabilities at a time. One would assume that more products require more fixes, yet we are seeing smaller patches with fewer fixes for more products," wrote Amichai Shulman, CTO of security firm Imperva, in a blog post.