vendor:
Java
by:
Frederic Hoguin and jduck
N/A
CVSS
N/A
Code Execution
264
CWE
Product Name: Java
Affected Version From: 6 prior to update 24
Affected Version To: 6 prior to update 24
Patch Exists: YES
Related CWE: CVE-2010-4452
CPE: a:oracle:java
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0121/, https://www.rapid7.com/db/vulnerabilities/jre-vuln-cve-2010-4452/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2010-4452/, https://www.rapid7.com/db/vulnerabilities/vmsa-2011-0013-cve-2010-4452/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0282/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0357/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2010-4452/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2010-4452/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0880/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2011
Sun Java Applet2ClassLoader Remote Code Execution Exploit
This module exploits a vulnerability in Java Runtime Environment that allows an attacker to escape the Java Sandbox. By supplying a codebase that points at a trusted directory and a code that is a URL that does not contain an dots an applet can run without the sandbox. The vulnerability affects version 6 prior to update 24.
Mitigation:
Update Java Runtime Environment to version 6 update 24 or later