Oracle JRE 1.6 web Start Remote Code Execution Vulnerability

Summary

Oracle JRE is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition

Credit:

The information has been provided by Craig Blackie
The original article can be found at: http://www.securitytracker.com/id/1037637


Details

Vulnerable Systems:
 * Oracle JDK 1.6
 * Oracle JDK 1.7
 * Oracle JDK 1.8
 * Oracle JDK 1.8
 * Oracle JRE 1.6
 * Oracle JRE 1.7
 * Oracle JRE 1.8
 * Oracle JRE 1.8
 * Oracle Jrockit R28.3.12

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).

CVE Information:
CVE-2017-3253

Disclosure Timeline:
Publish Date : 2017-01-27
Last Update Date : 2017-02-10

Categories: News