vendor:
Java
by:
Berend-Jan "SkyLined" Wever
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Java
Affected Version From: Oracle Java 6 Update 20
Affected Version To: Oracle Java 6 Update 21
Patch Exists: YES
Related CWE: CVE-2010-0840
CPE: a:oracle:java:6
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0471/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/vmsa-2011-0003-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0337/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0338/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0574/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0586/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/jre-unspecified-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/hpsim-cve-2010-0840/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0339/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0383/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0489/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2010
Internet Exploiter 12+DEP: Oracle Java 6 OBJECT tag “launchjnlp”/”docbase” param buffer overflow exploit.
This exploit targets a stack based buffer overflow in Oracle Java 6. The vulnerability has been confirmed in Update 20 and 21 and it probably exists in earlier version as well. The overflow allows control over the EBP and EIP registers when the vulnerable code returns. This exploit tries to bypass DEP using the "Havoc" mechanism first published at http://skypher.com/index.php/2010/03/01/internet-exploiter-2-dep/. This is a combination of a heap spray and a ret-into-libc attack that tries to set the executable flag on a block of memory in the heap spray before executing it.
Mitigation:
Upgrade to the latest version of Oracle Java 6.