SCAN: Metasploit Framework Java Applet In-Line Payload

This signature detects the behavior of the Metasploit Framework exploiting a Java vulnerability via an in-line Applet tag. Such activity is inherently malicious and should be investigated.

Extended Description

Oracle Java SE is prone to a remote code execution vulnerability in Java Runtime Environment. An attacker can exploit this issue to bypass the Java sandbox restriction and execute arbitrary code. This vulnerability affects the following supported versions: 7 Update 2, 6 Update 30, 5.0 Update 33

Affected Products

Sun jre_(linux_production_release)

References

BugTraq: 52161

CVE: CVE-2012-0507

Short Name
SCAN:METASPLOIT:JAVA-APPLET
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SCAN
Keywords
Applet CVE-2012-0507 Framework In-Line Java Metasploit Payload bid:52161
Release Date
04/26/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Hitachi

Sun

Hp

Oracle

Ubuntu

Mandriva

Debian

Ibm

CVSS Score

10.0

Found a potential security threat?