Oracle Java SE < 7 Update 25 Arbitrary Code Execution

Critical Nessus Network Monitor Plugin ID 9350

Synopsis

The remote host is missing a critical Oracle Java SE patch update.

Description

The Oracle Java SE installed on the remote host is a version prior to 7 Update 25 and is therefore affected by a flaw in the 'ObjectInputStream.readObject()' function that is triggered when deserializing Java Objects. This may allow a context-dependent attacker to execute arbitrary code. Oracle fixed this issue in Java SE 7u25 on 2013-06-18 and Java SE 8 on 2014-03-18, but did not disclose the vulnerability in the associated CPU. This issue was later found and disclosed on 2016-01-26, despite being silently patched years before.

Solution

Update to Java 1.7.0_25 (for JRE 7) or later.

See Also

https://gist.github.com/frohoff/24af7913611f8406eaf3

Plugin Details

Severity: Critical

ID: 9350

Family: Web Clients

Published: 2016/06/09

Modified: 2016/12/06

Dependencies: 8892, 8893

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:java_se

Patch Publication Date: 2014/03/18

Vulnerability Publication Date: 2016/01/26