Think you have a false positive on this rule?

Sid 1-49845

Message

FILE-JAVA Oracle Java privileged protection domain exploitation attempt

Summary

Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.

Impact

CVSS base score 10.0 CVSS impact score 10.0 CVSS exploitability score 10.0 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE

CVE-2012-4681:

CVSS base score 10.0

CVSS impact score 10.0

CVSS exploitability score 10.0

Confidentiality Impact COMPLETE

Integrity Impact COMPLETE

Availability Impact COMPLETE

Detailed information

CVE-2012-4681: Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.

Affected systems

  • oracle jdk 1.4.2_38
  • oracle jdk 1.5.0
  • oracle jdk 1.6.0
  • oracle jdk 1.7.0
  • oracle jre 1.4.2_38
  • oracle jre 1.5.0
  • oracle jre 1.6.0
  • oracle jre 1.7.0
  • sun jdk 1.4.2
  • sun jdk 1.4.2_1
  • sun jdk 1.4.2_2
  • sun jdk 1.4.2_3
  • sun jdk 1.4.2_4
  • sun jdk 1.4.2_5
  • sun jdk 1.4.2_6
  • sun jdk 1.4.2_7
  • sun jdk 1.4.2_8
  • sun jdk 1.4.2_9
  • sun jdk 1.4.2_10
  • sun jdk 1.4.2_11
  • sun jdk 1.4.2_12
  • sun jdk 1.4.2_13
  • sun jdk 1.4.2_14
  • sun jdk 1.4.2_15
  • sun jdk 1.4.2_16
  • sun jdk 1.4.2_17
  • sun jdk 1.4.2_18
  • sun jdk 1.4.2_19
  • sun jdk 1.4.2_22
  • sun jdk 1.4.2_23
  • sun jdk 1.4.2_25
  • sun jdk 1.4.2_26
  • sun jdk 1.4.2_27
  • sun jdk 1.4.2_28
  • sun jdk 1.4.2_29
  • sun jdk 1.4.2_30
  • sun jdk 1.4.2_31
  • sun jdk 1.4.2_32
  • sun jdk 1.4.2_33
  • sun jdk 1.4.2_34
  • sun jdk 1.4.2_35
  • sun jdk 1.4.2_36
  • sun jdk 1.4.2_37
  • sun jdk 1.5.0
  • sun jdk 1.6.0
  • sun jdk 1.6.0.200
  • sun jdk 1.6.0.210
  • sun jre 1.4.2_1
  • sun jre 1.4.2_2
  • sun jre 1.4.2_3
  • sun jre 1.4.2_4
  • sun jre 1.4.2_5
  • sun jre 1.4.2_6
  • sun jre 1.4.2_7
  • sun jre 1.4.2_8
  • sun jre 1.4.2_9
  • sun jre 1.4.2_10
  • sun jre 1.4.2_11
  • sun jre 1.4.2_12
  • sun jre 1.4.2_13
  • sun jre 1.4.2_14
  • sun jre 1.4.2_15
  • sun jre 1.4.2_16
  • sun jre 1.4.2_17
  • sun jre 1.4.2_18
  • sun jre 1.4.2_19
  • sun jre 1.4.2_20
  • sun jre 1.4.2_21
  • sun jre 1.4.2_22
  • sun jre 1.4.2_23
  • sun jre 1.4.2_24
  • sun jre 1.4.2_25
  • sun jre 1.4.2_26
  • sun jre 1.4.2_27
  • sun jre 1.4.2_28
  • sun jre 1.4.2_29
  • sun jre 1.4.2_30
  • sun jre 1.4.2_31
  • sun jre 1.4.2_32
  • sun jre 1.4.2_33
  • sun jre 1.4.2_34
  • sun jre 1.4.2_35
  • sun jre 1.4.2_36
  • sun jre 1.4.2_37
  • sun jre 1.5.0
  • sun jre 1.6.0

Ease of attack

CVE-2012-4681:

Access Vector NETWORK

Access Complexity LOW

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References