Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Oracle Java SE Java Runtime Environment Code Execution Vulnerability - (Windows)
Information
Severity
Severity
Critical
Family
Family
General
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
11 years ago
Modified
Modified
5 years ago
Summary
This host is installed with Oracle Java SE and is prone to code execution vulnerability.
Insight
Insight
The 'AtomicReferenceArray' class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.
Affected Software
Affected Software
Oracle Java SE versions 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier
Solution
Solution
Apply the patch from the referenced advisory.