Follow:

 

Exploit:Java/CVE-2012-5076.GAA


Exploit:Java/CVE-2012-5076.GAA is a malicious Java applet that attempt to exploit a vulnerability (CVE-2012-5076) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.

If you visit a website containing the malicious code while using a vulnerable version of Java, Exploit:Java/CVE-2012-5076.GAA is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.

The following versions of Java are vulnerable to this exploit:

JDK and JRE 7 Update 7 and earlier

Steps you can take

The nature of this threat means that you may need to take some steps to prevent being vulnerable from this, and similar exploits. We suggest you:

  1. Clear the Java cache
  2. Update Java
  3. Remove older versions of Java

For detailed information about these steps, please see the Additional removal instructions below.



What to do now

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:

Additional removal instructions

A detection of this exploit may be triggered from your Java cache, if a previous attempt at exploit has been made. When using Java, the Java cache is known as the Temporary Files folder and is commonly located at C:\Users\<user name>\AppData\Local\Sun\Java\Deployment\cache\. The Temporary Files (or cache) folder contains webpage content that is stored on your hard disk for quick viewing.

We recommend that you delete your temporary Java files to prevent the persistent detection of this exploit from within this folder. For instructions on how to delete temporary Java files, please see the following article:

How do I clear the Java cache?

Update vulnerable Java applications

This threat exploits a known vulnerability in Java. After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability in Java, as well as where to download the software update from the following links:

It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.

Threat behavior

Exploit:Java/CVE-2012-5076.GAA is a family of malicious Java applets that attempt to exploit a vulnerability (CVE-2012-5076) in the Java Runtime Environment (JRE) in order to download and install files of an attacker’s choice onto your computer.

The following versions of Java are vulnerable to this exploit:

JDK and JRE 7 Update 7 and earlier

To check if you're running a vulnerable version of Java:

  1. Go to the control panel (Select Start|Control Panel)
  2. Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the JavaControl Panel.
  3. On the General tab, click About to see which version of Java you have installed.

Make sure that you install all available updates from the vendor in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:

Note: This detection may be triggered when you visit a website that contains the malicious code. Even if you are not using a vulnerable version of the JRE this detection may be reported when you visit a website that contains the malicious code. This does not mean that you have been compromised, rather that an attempt to compromise your computer has been made.

For more information about this family of exploits, see the family description elsewhere in the encyclopedia.

 


Symptoms

If this detection is reported then it is likely that your computer has been compromised beyond this single infection. Your antivirus solution may soon begin to report other malware detections as new malicious files are downloaded and executed on your computer.

There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptoms.


Prevention


Alert level: Severe
First detected by definition: 1.143.1804.0
Latest detected by definition: 1.173.2181.0 and higher
First detected on: Feb 07, 2013
This entry was first published on: Feb 07, 2013
This entry was updated on: Mar 04, 2013

This threat is also detected as:
No known aliases