Intrusion Prevention

Oracle.Java.Runtime.True.Type.Font.IDEF.Opcode.Buffer.Overflow

Description

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Oracle Java Runtime.
The vulnerability is due to a validation error when processing IDEF opcodes. As a result, a remote attacker can exploit this to exploit this to execute arbitrary code within the context of the application.

Affected Products

Oracle Java Runtime Environment (JRE) 1.4.2_35 and earlier versions
Oracle Java Runtime Environment (JRE) 5 Update 33 and earlier versions
Oracle Java Runtime Environment (JRE) 6 Update 30 and earlier versions
Oracle Java Runtime Environment (JRE) 7 Update 2 and earlier versions
Oracle Java Development Kit (JDK) 1.4.2_35 and earlier versions
Oracle Java Development Kit (JDK) 5 Update 33 and earlier versions
Oracle Java Development Kit (JDK) 6 Update 30 and earlier versions
Oracle Java Development Kit (JDK) 7 Update 2 and earlier versions

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html

CVE References

CVE-2012-0499