HTTP: Oracle Java IE Browser Plugin docbase Parameter Stack Buffer Overflow

This signature detects attempts to exploit a known code execution vulnerability in Oracle Java. It is contained in the Java plugin handler for Internet Explorer, JP2IEXP.dll. While parsing the parameter docbase, the value is copied into a fixed length buffer on the stack without validation. This can lead to a stack buffer overflow. An attacker can exploit this by enticing a user to visit a specially crafted Web site. This can lead to arbitrary code execution in the context of the affected application

Extended Description

Oracle Java SE and Java for Business are prone to a remote vulnerability in the Java plug-in for Internet Explorer. An attacker can exploit this vulnerability by using a malicious webpage. Due to a buffer overflow, it is possible for an attacker to execute arbitrary code in the context of the currently logged-in user. This vulnerability affects version 6 Update 21.

Affected Products

Avaya proactive_contact

References

BugTraq: 44023

CVE: CVE-2010-3552

Short Name
HTTP:STC:JAVA:DOCBASE-BOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Browser Buffer CVE-2010-3552 IE Java Oracle Overflow Parameter Plugin Stack bid:44023 docbase
Release Date
12/07/2010
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3378
False Positive
Unknown
Vendors

Red_hat

Suse

Gentoo

Sun

Hp

Avaya

Vmware

CVSS Score

10.0

Found a potential security threat?