Oracle.Java.ServiceLoader.Exception.Handling.Sandbox.Bypass

description-logoDescription

This indicates an attack attempt to exploit a Sandbox Bypass vulnerability in Oracle Java.
The vulnerability is due to an error when vulnerable module handles a crafted Java applet. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application via malicious crafted Java applet.

affected-products-logoAffected Products

Oracle Java Runtime Environment (JRE) 5.0u61 and prior
Oracle Java Runtime Environment (JRE) 6u71 and prior
Oracle Java Runtime Environment (JRE) 7u51 and prior
Oracle Java Runtime Environment (JRE) 8
Oracle Java SE Embedded 7u51 and prior
Oracle JRockit R27.8.1 and prior
Oracle JRockit R28.3.1 and prior
Oracle Java Development Kit (JDK) 5.0u61 and prior
Oracle Java Development Kit (JDK) 6u71 and prior
Oracle Java Development Kit (JDK) 7u51 and prior
Oracle Java Development Kit (JDK) 8

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version available from the website.
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html#AppendixJAVA

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)