If you are using a vulnerable version of the JRE and this detection is reported then it is likely that your computer has been compromised. Your antivirus solution may soon begin to report other malware detections as new malicious files are downloaded and executed on your computer.
Exploit:Java/CVE-2012-0507.BB is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer.
What to do now
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:
This threat exploits a known vulnerability in Java. After removing this threat, make sure that you install the updates available from the vendor. You can read more about this vulnerability in Java, as well as where to download the software update from the following links:
It may be necessary to-remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.
Exploit:Java/CVE-2012-0507.BB is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. Versions of the JRE up to and including the following are vulnerable to this exploit:
Version 7 update 2
Version 6 update 30
Version 5 update 33
To check if you're running a vulnerable version of Java:
Go to the control panel (Select Start|Control Panel)
Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
On the General tab, click About to see which version of Java you have installed.
Make sure that you install all available updates from the vendor in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:
Note: This detection may be triggered when you visit a website that contains the malicious code. Even if you are not using a vulnerable version of the JRE this detection may be reported when you visit a website that contains the malicious code. This does not mean that you have been compromised, but rather that an attempt to compromise your computer has been made.
Downloads and installs arbitrary files
If you visit a website containing the malicious code while using a vulnerable version of Java, Exploit:Java/ CVE-2012-0507.BB is loaded. It then attempts to download and execute files from a remote host/URL. The files that are downloaded and executed could be any of the attacker's choice and could include additional malware.
Additional technical details
In the wild, we have seen the following Java class files included in malicious Java archives. Most of these files are detected as Exploit:Java/CVE-2012-0507.BB:
The vulnerability is related to an issue with the deserialization of "AtomicReferenceArray" objects, which allows remote attackers to call, without proper "sandboxing", system level Java functions via the ClassLoader of a constructor that is being deserialized. This means that the exploit is able to perform malicious actions that it would not normally have permission for.