Oracle.Java.Font.Parsing.maxPoint.Heap.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Oracle Java Runtime.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted TrueType Font. An attacker can exploit this by tricking an unsuspecting user into visiting a webpage containing a malicious Java applet and execute arbitrary code within the context of the application.
Affected Products
Oracle Java Runtime Environment (JRE) 7 update 7 and prior
Oracle Java Development Kit (JDK) 7 update 7 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch available from the website.
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |