HTTP: Oracle Java IE Browser Plugin docbase Parameter Stack Buffer Overflow
This signature detects attempts to exploit a known code execution vulnerability in Oracle Java. It is contained in the Java plugin handler for Internet Explorer, JP2IEXP.dll. While parsing the parameter docbase, the value is copied into a fixed length buffer on the stack without validation. This can lead to a stack buffer overflow. An attacker can exploit this by enticing a user to visit a specially crafted Web site. This can lead to arbitrary code execution in the context of the affected application
Extended Description
Oracle Java SE and Java for Business are prone to a remote vulnerability in the Java plug-in for Internet Explorer. An attacker can exploit this vulnerability by using a malicious webpage. Due to a buffer overflow, it is possible for an attacker to execute arbitrary code in the context of the currently logged-in user. This vulnerability affects version 6 Update 21.
Affected Products
Avaya proactive_contact
srx-branch-19.3
vsrx3bsd-19.2
srx-19.4
vsrx3bsd-19.4
srx-branch-19.4
vsrx-19.4
vsrx-19.2
srx-19.3
srx-branch-12.3
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx-12.3
vmx-19.3
srx-12.3
Red_hat
Suse
Gentoo
Sun
Hp
Avaya
Vmware
10.0