Follow:

You have been re-routed to the Exploit:Java/CVE-2011-3544.NF write up because Exploit%3aJava%2fCVE-2011-3544.NF has been renamed to Exploit:Java/CVE-2011-3544.NF
 

Exploit:Java/CVE-2011-3544.NF


Exploit:Java/CVE-2011-3544.NF is a malicious Java applet that attempts to exploit a vulnerability (CVE-2011-3544) in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. 

If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware.

The following versions of Java are vulnerable to this exploit:

  • JDK and JRE 7 Java SE
  • JDK and JRE 6 Update 27 and earlier Java SE
  • JDK and JRE 5.0 Update 31 and earlier Java SE
  • SDK and JRE 1.4.2_33 and earlier Java SE
  • JavaFX 2.0 JavaFX
  • JRockit R28.1.4 and earlier (JDK and JRE 6 and 5.0) JRockit


What to do now

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:

For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.

Update vulnerable Java applications

This threat exploits a known vulnerability in Java. After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability in Java, as well as where to download the software update from the following links:

It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.

Threat behavior

Exploit:Java/CVE-2011-3544.NF is a malicious Java applet that attempts to exploit a vulnerability (CVE-2011-3544) in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. 

The following versions of Java are vulnerable to this exploit:

  • JDK and JRE 7 Java SE
  • JDK and JRE 6 Update 27 and earlier Java SE
  • JDK and JRE 5.0 Update 31 and earlier Java SE
  • SDK and JRE 1.4.2_33 and earlier Java SE
  • JavaFX 2.0 JavaFX
  • JRockit R28.1.4 and earlier (JDK and JRE 6 and 5.0) JRockit

To check if you're running a vulnerable version of Java:

  1. Go to the control panel (Select Start|Control Panel)
  2. Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
  3. On the General tab, click About to see which version of Java you have installed.

Make sure that you install all available updates from the vendor in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:

Note: This detection may be triggered when you visit a website that contains the malicious code. Even if you are not using a vulnerable version of the JRE this detection may be reported when you visit a website that contains the malicious code. This does not mean that you have been compromised, rather that an attempt to compromise your computer has been made.

For more information on this exploit family, please see the description for Exploit:Java/CVE-2011-3544 elsewhere in the encyclopedia.


Symptoms

If this detection is reported then it is likely that your computer has been compromised beyond this single infection. Your antivirus solution may soon begin to report other malware detections as new malicious files are downloaded and executed on your computer.

There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptoms.


Prevention


Alert level: Severe
This entry was first published on: Nov 21, 2012
This entry was updated on: Nov 27, 2012

This threat is also detected as:
No known aliases