Lucene search

K
saintSAINT CorporationSAINT:253BC92A6F7874E1129C66F56AF842CC
HistoryAug 30, 2012 - 12:00 a.m.

Oracle Java findMethod findClass Security Bypass

2012-08-3000:00:00
SAINT Corporation
www.saintcorporation.com
30

0.975 High

EPSS

Percentile

100.0%

Added: 08/30/2012
CVE: CVE-2012-4681
BID: 55213
OSVDB: 84867

Background

Java is a programming language that compiles programs to bytecode, which is then executed inside a Java Virtual Machine. This is optimal for applications that must run on various hardware platforms, such as web applets.

Problem

In Java 7.0 prior to Update 7, two vulnerabilities exist that allow malicious applets to execute arbitrary code outside the Java security sandbox. If an attacker were to host such a malicious applet on a website, they could execute arbitrary code on the systems of any vulnerable users who load the applet.

Resolution

Update to Java 7 Update 7.

References

<http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html&gt;
<http://krebsonsecurity.com/2012/08/attackers-pounce-on-zero-day-java-exploit/&gt;
<http://www.techworld.com.au/article/434757/unpatched_java_vulnerability_exploited_targeted_attacks_researchers_say/&gt;

Limitations

This exploit has been tested against Oracle JRE 7 Update 6 on the following platforms:

  • Windows XP SP3 English (DEP OptIn) and Windows 7 SP1 (DEP OptIn) using Internet Explorer 8 or 9
  • Apple Mac OS X 10.7.4 using Safari
  • Ubuntu Desktop 12.04 LTS using Firefox

Platforms

Windows
Mac OS X
Linux