Check Point Reference: | CPAI-2012-792 |
Date Published: | 29 Apr 2013 |
Severity: | High |
Last Updated: | Wednesday 08 January, 2025 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Oracle Java Runtime Environment (JRE) 7 update 7 and prior Oracle Java Development Kit (JDK) 7 update 7 and prior |
Vulnerability Description | A heap memory corruption vulnerability exists in Oracle Java Runtime. The vulnerability is due to the font parsing code failing to check the "maxPoints" value used in controlling heap memory operation. A remote unauthenticated attacker can exploit this vulnerability by persuading users to load a malicious web page containing a java applet. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Oracle Protection Violation
Attack Information: Oracle Java Font Parsing maxPoints Heap Buffer Overflow