Oracle Java SE < 7 Update 25 Arbitrary Code Execution

high Nessus Network Monitor Plugin ID 9350

Synopsis

The remote host is missing a critical Oracle Java SE patch update.

Description

The Oracle Java SE installed on the remote host is a version prior to 7 Update 25 and is therefore affected by a flaw in the 'ObjectInputStream.readObject()' function that is triggered when deserializing Java Objects. This may allow a context-dependent attacker to execute arbitrary code. Oracle fixed this issue in Java SE 7u25 on 2013-06-18 and Java SE 8 on 2014-03-18, but did not disclose the vulnerability in the associated CPU. This issue was later found and disclosed on 2016-01-26, despite being silently patched years before.

Solution

Update to Java 1.7.0_25 (for JRE 7) or later.

See Also

https://gist.github.com/frohoff/24af7913611f8406eaf3

Plugin Details

Severity: High

ID: 9350

Family: Web Clients

Published: 6/9/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:java_se

Patch Publication Date: 3/18/2014

Vulnerability Publication Date: 1/26/2016