Oracle.Java.ImaginLib.LookupByteBI.Memory.Corruption

description-logoDescription

This indicates an attack attempt against a Memory Corruption vulnerability in Oracle Java.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted Java file. An attacker can exploit this by tricking an unsuspecting user into visiting a webpage containing a malicious Java applet and execute arbitrary code within the context of the application.

affected-products-logoAffected Products

Oracle Java Development Kit (JDK) 7 Update 21 and prior
Oracle Java Development Kit (JDK) 6 Update 45 and prior
Oracle Java Development Kit (JDK) 5.0 Update 45 and prior
Oracle Java Runtime Environment (JRE) 7 Update 21 and before
Oracle Java Runtime Environment (JRE) 6 Update 45 and prior
Oracle Java Runtime Environment (JRE) 5.0 Update 45 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)