How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote Unix host contains a programming platform that is affected
by multiple vulnerabilities.
The version of Oracle (formerly Sun) Java SE or Java for Business
installed on the remote host is earlier than 7 Update 7 and is,
therefore, potentially affected the following vulnerabilities :
- The 'getField' method in the 'sun.awt.SunToolkit class'
provided by the bundled SunToolkit can be used to
obtain any field of a class - even private fields.
This error can allow privilege escalation.
- Two unspecified remote code execution vulnerabilities
exist related to the
'com.sun.beans.finder.FieldFinder' methods. No further
details have been provided. (CVE-2012-1682,
- The 'setField' method provided by the bundled SunToolkit
can be used to execute a privileged operation and calls
'setAccessible(true)' on the returned field reference,
allowing an attacker to disable any 'final' or 'private'
directives and gain full control to run code in the Java
virtual machine. (CVE-2012-4681)
Note that at least one of these vulnerabilities is currently being
exploited in the wild.
See also :
Upgrade to JDK / JRE 7 Update 7 or later, and remove, if necessary, any
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Nessus Plugin ID: 64841 ()
Bugtraq ID: 55213553365533755339
CVE ID: CVE-2012-0547CVE-2012-1682CVE-2012-3136CVE-2012-4681
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.