SCAN: Metasploit Framework Java Applet In-Line Payload
This signature detects the behavior of the Metasploit Framework exploiting a Java vulnerability via an in-line Applet tag. Such activity is inherently malicious and should be investigated.
Extended Description
Oracle Java SE is prone to a remote code execution vulnerability in Java Runtime Environment. An attacker can exploit this issue to bypass the Java sandbox restriction and execute arbitrary code. This vulnerability affects the following supported versions: 7 Update 2, 6 Update 30, 5.0 Update 33
Affected Products
Sun jre_(linux_production_release)
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Apple
Hitachi
Sun
Hp
Oracle
Ubuntu
Mandriva
Debian
Ibm
10.0