Java Applet Reflection Type Confusion Remote Code Execution (CVE-2013-2423)
|Check Point Reference:||CPAI-2013-1685|
|Protection Provided by:||
Who is Vulnerable?
Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7
An unknown vulnerability has been reported in Java Runtime Environment. The vulnerability is due to unknown vectors related to HotSpot. A remote attacker can exploit this issue by enticing a target user to view a specially crafted web page.
This protection will detect and block the transferring of a malicious jar file.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
- In the IPS tab, click Protections and find the Java Applet Reflection Type Confusion Remote Code Execution protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: Web Server Enforcement Violation
Attack Information: Java Applet Reflection Type Confusion Remote Code Execution