// For flags

CVE-2012-1543

Oracle Java JavaFX WCMediaPlayer Remote Code Execution Vulnerability

Severity Score

7.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an invalid type cast in the JSObject class.

Vulnerabilidad sin especificar en el componente JavaFX en Oracle Java SE JavaFX 2.2.4 y anteriores, permite a atacantes remotos comprometer la integridad, disponibilidad y confidencialidad a través de vectores no especificados. Vulnerabilidad distinta de otros CVEs listados en febrero de 2003.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the JavaFX WCMediaPlayer class. All WCMediaPlayer's private native methods are accessible from descendant classes through corresponding protected methods. A value utilized by these native functions can be controlled by the class constructor and can be set to an arbitrary memory pointer to cause memory corruption. An attacker could leverage this to gain remote code execution under the context of the process.

*Credits: Vitaliy Toropov
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-03-08 CVE Reserved
  • 2013-02-02 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-11-01 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
<= 2.2.4
Search vendor "Oracle" for product "Javafx" and version " <= 2.2.4"
-
Affected
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
2.0
Search vendor "Oracle" for product "Javafx" and version "2.0"
-
Affected
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
2.0.2
Search vendor "Oracle" for product "Javafx" and version "2.0.2"
-
Affected
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
2.0.3
Search vendor "Oracle" for product "Javafx" and version "2.0.3"
-
Affected
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
2.1
Search vendor "Oracle" for product "Javafx" and version "2.1"
-
Affected
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
2.2
Search vendor "Oracle" for product "Javafx" and version "2.2"
-
Affected
Oracle
Search vendor "Oracle"
Javafx
Search vendor "Oracle" for product "Javafx"
2.2.3
Search vendor "Oracle" for product "Javafx" and version "2.2.3"
-
Affected