Oracle Java SE 7 <= Update 10 Remote Code Execution

Critical Nessus Network Monitor Plugin ID 6664


The remote Windows host contains a programming platform that is affected by a code execution vulnerability


This version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is 7 Update 10 or earlier and is, therefore, potentially affected by the following security issues:

- An unspecified issue exists in the Libraries component. (CVE-2012-3174)

- An error exists in the 'MBeanInstantiator.findClass' method that could allow remote, arbitrary code execution. (CVE-2013-0422)

Note that, according the advisory, these issues apply to client deployments of Java only and can only be exploited through untrusted 'Java Web Start' applications and untrusted Java applets


Update to JDK / JRE 7 Update 11 or later and, if necessary, remove any affected versions.

See Also

Plugin Details

Severity: Critical

ID: 6664

File Name: 6664.prm

Family: Web Clients

Published: 2012/01/10

Modified: 2016/01/19

Dependencies: 1735, 8314

Nessus ID: 63521

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 9.1


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:java_se

Patch Publication Date: 2013/01/10

Vulnerability Publication Date: 2013/01/10

Exploitable With


Metasploit (Java Applet JMX Remote Code Execution)

Reference Information

CVE: CVE-2012-3174, CVE-2013-0422

BID: 57246, 57312

OSVDB: 89059