Multiple versions of Oracle Java contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
The vulnerability exists because the scripting component of the affected software fails to apply sufficient security restrictions while processing web pages. An unauthenticated, remote attacker could exploit the vulnerability by persuading a user to visit a malicious web page. If successful, the attacker could bypass security restrictions to execute arbitrary code on a targeted system.
Functional code that demonstrates an exploit of this vulnerability is available as a part of the Metasploit framework.
Oracle has confirmed this vulnerability and released updated software.
Indicators of Compromise
The following products are affected:
Oracle Java Development Kit (JDK) and Oracle Java Runtime Environment (JRE) 7
Oracle JDK and Oracle JRE 6.0 Update 27 and prior
Oracle JDK 5.0 Update 31 and prior
Oracle Java Software Development Kit (SDK) and Oracle JRE 1.4.2_33 and prior
An unauthenticated, remote attacker could exploit this vulnerability by persuading a user to visit a malicious web page that contains malicious code or a malicious Java applet. If successful, the attacker could bypass the security restrictions that are implemented by the SecurityManager to execute arbitrary code with the privileges of the user. If the user holds Administrator privileges, complete system compromise could result.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.
Administrators are advised to apply the appropriate updates.
Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.
Administrators are advised to monitor affected systems.
Red Hat Enterprise Linux Workstation Supplementary
6 (IA-32, x86_64)
5 (IA-32, PPC, PPC64, S390, S390x, x86_64)
FreeFlow Print Server
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM
THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products
Cisco Multivendor Vulnerability Alerts respond to vulnerabilities identified in third-party vendors' products. These alerts contain information compiled from diverse sources and provide comprehensive technical descriptions, objective analytical assessments, workarounds and practical safeguards, and links to vendor advisories and patches.