Short Name |
HTTP:STC:DL:MAL-RMF-GM |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Oracle Java XGetSamplePtrFromSnd Memory Corruption |
Release Date |
2011/04/28 |
Update Number |
1911 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known flaw in Oracle JRE and JDK. Successful exploitation could result in execution of arbitrary code within the security context of the current user.
Oracle Java SE and Java for Business are prone to a remote code-execution vulnerability in Java Runtime Environment. This issue affects the Sound subcomponent. To exploit this issue, an attacker must entice an unsuspecting user into visiting a specially crafted webpage that contains a malicious Applet or into opening a specially crafted file. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This vulnerability affects the following supported versions: 6 Update 23, 5.0 Update 27, 1.4.2_29