Intrusion Prevention

Oracle.Java.ImaginLib.LookupByteBI.Memory.Corruption

Description

This indicates an attack attempt against a Memory Corruption vulnerability in Oracle Java.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted Java file. An attacker can exploit this by tricking an unsuspecting user into visiting a webpage containing a malicious Java applet and execute arbitrary code within the context of the application.

Affected Products

Oracle Java Development Kit (JDK) 7 Update 21 and prior
Oracle Java Development Kit (JDK) 6 Update 45 and prior
Oracle Java Development Kit (JDK) 5.0 Update 45 and prior
Oracle Java Runtime Environment (JRE) 7 Update 21 and before
Oracle Java Runtime Environment (JRE) 6 Update 45 and prior
Oracle Java Runtime Environment (JRE) 5.0 Update 45 and prior

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html

CVE References

CVE-2013-2470