Oracle Java 7 Update 10 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
Reports indicate that an unspecified remote code execution vulnerability exists in the affected software that could allow an attacker to execute arbitrary code on a targeted system. To exploit the vulnerability, an unauthenticated, remote attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.
Functional code that exploits the vulnerability is publicly available and actively exploited in the wild. Reports indicate the Blackhole and Nuclear Pack exploit kits have incorporated this vulnerability, which could help an attacker in a successful exploit.
Reports indicate the latest version of Java 7 is exploitable. During initial testing of Java 6, the exploit was unsuccessful; however, further testing may prove otherwise.
Oracle has not confirmed this vulnerability and software updates are not available.
US-CERT has released a vulnerability note at the following link: VU#625617
Administrators are advised to contact the vendor regarding future updates and releases.
Users may consider using the previous version of Java, which does not contain the vulnerability.
Users are advised to disable Java content in web browsers through the Java control panel applet.
Administrators may consider disabling Java and the Java plug-in in web browsers. Instructions for disabling Java in web browsers can be found at the following links:
Administrators may consider uninstalling Java.