Unspecified vulnerability in the Java Runtime Environment
Publish date: March 07, 2013
Severity: CRITICAL
CVE Identifier: CVE-2011-3544
Advisory Date: DEC 23, 2011
DESCRIPTION
Unspecified vulnerability in theJava Runtime Environment component in Oracle Java SE JDK and JRE allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to scripting.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields the following vulnerabilities using the specified filter identifiers. Trend Micro clients using OfficeScan with the Intrusion Defense Firewall plugin are also protected from exploits using these vulnerabilities.
Bulletin ID | Vulnerability ID | Rule Number & Title | Deep Security Pattern Version | Deep Security Pattern Release Date |
---|---|---|---|---|
CVE-2011-3544 | 1004867 - Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability | 11-034 | Dec 6, 2011 | |
CVE-2011-3544 | 1004870 -Identified Suspicious JAR file | Dec 21, 2011 |
SOLUTION
AFFECTED SOFTWARE AND VERSION
- Oracle Java JDK and JRE 7
- Oracle JDK and JRE 7
- Oracle JDK and JRE 5.0 Update 31 and earlier
- Oracle SDK and JRE 1.4.2_33 and earlier
- Oracle JavaFX 2.0
- Oracle JRockit R28.1.4 and earlier (JDK and JRE 6 and 5.0)
OTHER INFORMATION
Featured Stories
- Abusing Argo CD, Helm, and Artifact Hub: An Analysis of Supply Chain Attacks in Cloud-Native ApplicationsWe provide an overview of cloud-native tools and examine how cybercriminals can exploit their vulnerabilities to launch supply chain attacks.Read more
- Trends and Shifts in the Underground N-Day Exploit MarketOur two-year research provides insights into the life cycle of exploits, the types of exploit buyers and sellers, and the business models that are reshaping the underground exploit market.Read more
- The Nightmares of Patch Management: The Status Quo and BeyondWe discuss the challenges that organizations face in managing endpoint and server patches.Read more
- Identifying Weak Parts of a Supply ChainMalicious attacks have consistently been launched on weak points in the supply chain. Like all attacks, these will evolve into more advanced forms. Software development, with multiple phases that could be placed at risk, is particularly vulnerable.Read more