Critical severity9.8CISA KEVNVD Advisory· Published Aug 28, 2012· Updated Apr 21, 2026
CVE-2012-4681
CVE-2012-4681
Description
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
Affected products
85cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*+ 40 more
- cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*+ 39 more
- cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.htmlnvdExploitThird Party Advisory
- labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/nvdBroken LinkExploit
- blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.htmlnvdThird Party Advisory
- marc.infonvdIssue TrackingMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1225.htmlnvdThird Party Advisory
- www.deependresearch.org/2012/08/java-7-vulnerability-analysis.htmlnvdBroken LinkThird Party Advisory
- www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.htmlnvdVendor Advisory
- www.securityfocus.com/bid/55213nvdBroken LinkThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA12-240A.htmlnvdThird Party AdvisoryUS Government Resource
- community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0daynvdBroken LinkThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.htmlnvdMailing List
- lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.htmlnvdMailing List
- secunia.com/advisories/51044nvdNot Applicable
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.