module

Sun Java JRE AWT setDiffICM Buffer Overflow

Disclosed
Nov 4, 2009
Created
May 30, 2018

Description

This module exploits a flaw in the setDiffICM function in the Sun JVM.

The payload is serialized and passed to the applet via PARAM tags. It must be
a native payload.

The effected Java versions are JDK and JRE 6 Update 16 and earlier,
JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and
earlier, and SDK and JRE 1.3.1_26 and earlier.

NOTE: Although all of the above versions are reportedly vulnerable, only
1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested.

Author

Platform

OSX,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/browser/java_setdifficm_bof
msf exploit(java_setdifficm_bof) > show targets
...targets...
msf exploit(java_setdifficm_bof) > set TARGET < target-id >
msf exploit(java_setdifficm_bof) > show options
...show and set options...
msf exploit(java_setdifficm_bof) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.