This vulnerability allows local attackers to escalate privileges on vulnerable installations of Oracle Java. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of a configuration file called usagetracker.properties. By modifying specific properties within this file, it is possible to create an arbitrary file with controlled data when the JVM is started. An attacker can leverage this vulnerability in certain situations to escalate privilege to the level of SYSTEM.