FreeBSD : Java 1.7 -- security manager bypass (16846d1e-f1de-11e1-8bd8-0022156e8794)

Critical Nessus Plugin ID 61740


The remote FreeBSD host is missing one or more security-related updates.


US-CERT reports :

Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.

By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the setSecurityManager() function to allow full privileges, without requiring code signing.

This vulnerability is being actively exploited in the wild, and exploit code is publicly available.

This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 61740

File Name: freebsd_pkg_16846d1ef1de11e18bd80022156e8794.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2012/08/31

Modified: 2013/11/18

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-sun-jdk, p-cpe:/a:freebsd:freebsd:linux-sun-jre, p-cpe:/a:freebsd:freebsd:openjdk, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/08/30

Vulnerability Publication Date: 2012/08/27

Exploitable With


Core Impact

Metasploit (Java 7 Applet Remote Code Execution)

Reference Information

CVE: CVE-2012-4681

CERT: 636312