BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Remote Code Execution Vulnerability in Java

Disclosed February 28, 2013    Fully Patched

Vulnerability Description:

A remote code execution vulnerability in Java is being leveraged in the wild. This vulnerability allows for arbitrary memory read and write operations in the Java virtual machine, which could be leveraged to execute arbitrary code within the context of the currently logged on user.

Vendors:

Oracle

Vulnerable Software/Devices:

Successful exploitation observed in the following:

  • Java 6u41
  • Java 7u15

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of these vulnerabilities is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 18344 - Oracle Java Memory Corruption Remote Code Execution (Zero-Day) - Windows - JDK
  • 18345 - Oracle Java Memory Corruption Remote Code Execution (Zero-Day) - Windows - JRE
  • 18346 - Oracle Java Memory Corruption Remote Code Execution (Zero-Day) - Linux - JDK
  • 18347 - Oracle Java Memory Corruption Remote Code Execution (Zero-Day) - Linux - JRE

Mitigation:

Disable Java in browsers.

Links:

CVE(s):

None

Leave a Reply