Oracle Java SE < 7 Update 25 Arbitrary Code Execution

high Nessus Network Monitor Plugin ID 9350

Synopsis

The remote host is missing a critical Oracle Java SE patch update.

Description

The Oracle Java SE installed on the remote host is a version prior to 7 Update 25 and is therefore affected by a flaw in the 'ObjectInputStream.readObject()' function that is triggered when deserializing Java Objects. This may allow a context-dependent attacker to execute arbitrary code. Oracle fixed this issue in Java SE 7u25 on 2013-06-18 and Java SE 8 on 2014-03-18, but did not disclose the vulnerability in the associated CPU. This issue was later found and disclosed on 2016-01-26, despite being silently patched years before.

Solution

Update to Java 1.7.0_25 (for JRE 7) or later.

See Also

https://gist.github.com/frohoff/24af7913611f8406eaf3

Plugin Details

Severity: High

ID: 9350

Family: Web Clients

Published: 6/9/2016

Updated: 3/6/2019

Vulnerability Information

CPE: cpe:/a:oracle:java_se

Patch Publication Date: 3/18/2014

Vulnerability Publication Date: 1/26/2016