Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Security Activity Bulletin

Oracle Java Remote Code Execution Vulnerability

 
Threat Type:IntelliShield: Security Activity Bulletin
IntelliShield ID:27841
Version:1
First Published:2013 January 10 12:57 GMT
Last Published:2013 January 10 12:57 GMT
Port: Not available
Urgency:Possible use
Credibility:Highly Credible
Severity:Moderate Damage
Related Resources:
 
 
Version Summary:Oracle Java contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. Updates are not available.
 

Description
 
Oracle Java 7 Update 10 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

Reports indicate that an unspecified remote code execution vulnerability exists in the affected software that could allow an attacker to execute arbitrary code on a targeted system. To exploit the vulnerability, an unauthenticated, remote attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.

Functional code that exploits the vulnerability is publicly available and actively exploited in the wild. Reports indicate the Blackhole and Nuclear Pack exploit kits have incorporated this vulnerability, which could help an attacker in a successful exploit.

Reports indicate the latest version of Java 7 is exploitable. During initial testing of Java 6, the exploit was unsuccessful; however, further testing may prove otherwise.

Oracle has not confirmed this vulnerability and software updates are not available.

US-CERT has released a vulnerability note at the following link: VU#625617

Administrators are advised to contact the vendor regarding future updates and releases.

Users may consider using the previous version of Java, which does not contain the vulnerability.

Users are advised to disable Java content in web browsers through the Java control panel applet.

Administrators may consider disabling Java and the Java plug-in in web browsers. Instructions for disabling Java in web browsers can be found at the following links:
Administrators may consider uninstalling Java.
 
Alert History
 
Initial Release


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Sun Microsystems, Inc.Java Runtime Environment (JRE) 7.0 Base, Update 1, Update 2, Update 3, Update 4, Update 5, Update 6, Update 7, Update 8, Update 9, Update 10

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield