CVE-2012-4681
KEV
🔴 Łataj teraz
Wielokrotne podatności w Java Runtime Environment umożliwiają zdalne wykonanie kodu.
CVSS
9.8
EPSS
94.1%
Exploit
weaponized
Vendor
oracle
Opis źródłowy (NVD)
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 94.1% |
| Opublikowano (NVD) | 2012-08-28 00:55:01 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 18:38:11 UTC |
Referencje
- http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html (cve@mitre.org) [Third Party Advisory]
- http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html (cve@mitre.org) [Exploit, Third Party Advisory]
- http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/ (cve@mitre.org) [Broken Link, Exploit]
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html (cve@mitre.org) [Mailing List]
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html (cve@mitre.org) [Mailing List]
- http://marc.info/?l=bugtraq&m=135109152819176&w=2 (cve@mitre.org) [Issue Tracking, Mailing List, Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2012-1225.html (cve@mitre.org) [Third Party Advisory]
- http://secunia.com/advisories/51044 (cve@mitre.org) [Not Applicable]
- http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html (cve@mitre.org) [Broken Link, Third Party Advisory]
- http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html (cve@mitre.org) [Vendor Advisory]
- http://www.securityfocus.com/bid/55213 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.us-cert.gov/cas/techalerts/TA12-240A.html (cve@mitre.org) [Third Party Advisory, US Government Resource]
- https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day (cve@mitre.org) [Broken Link, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-4681 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]