IBM has released a security bulletin and updated software to address the Oracle Java Runtime Environment readMabCurveData nTblSize arbitrary code execution vulnerability.
Multiple versions of Oracle Java Runtime Environment (JRE) contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
The vulnerability is due to improper parsing of user-submitted data by the implemented Java Configuration Management Module (CMM) in the affected software. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to visit a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user.
Oracle has confirmed this vulnerability and released updated software.
The following Oracle products are affected:
JRE 7 Update 2 and prior
JRE 6.0 Update 30 and prior
JRE 5.0 Update 33 and prior
Reports indicate that this vulnerability is being actively exploited in the wild.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.
IBM has released a security bulletin at the following link: swg21598423
Apple has released a security advisory at the following link: HT5228
Red Hat has released a security advisory at the following link: RHSA-2012:0139
An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code on the targeted system under the security context of the user. If the user holds Administrator privileges, a complete system compromise is possible.
The vulnerability is in the readMabCurveData() function implemented in the Java Configuration Management Module (cmm.dll). When parsing data, the affected function implicitly trusts user-supplied input for the nTblSize variable, which is then used to allocate heap memory. Because of this implicit trust, the size of the allocated heap memory could be less than the required value, leading to heap memory corruption.
An unauthenticated, remote attacker could exploit this vulnerability by persuading a user to visit a malicious web page. The processing of malicious Java content in the web page could trigger a memory corruption flaw that the attacker could use to execute arbitrary code with the privileges of the user.
Administrators are advised to apply the appropriate updates.
Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.
Administrators are advised to monitor affected systems.
Oracle has released patches for registered users at the following link: Oracle
Apple has released updated software at the following links:
Red Hat packages can be updated using the up2date or yum command.
Version 3, June 1, 2012, 10:13 AM: HP has released an additional security bulletin and updated software to address the Oracle Java runtime environment readMabCurveData nTblSize arbitrary code execution vulnerability.
Version 2, April 20, 2012, 12:37 PM: IBM has released an APAR and fixes to address the Oracle Java runtime environment readMabCurveData nTblSize arbitrary code execution vulnerability.
Version 1, April 10, 2012, 10:43 PM: Oracle Java Runtime Environment contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code. Updates are available.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.