Skip to main content
Skip to main content
Published Mar 23, 2011 | Updated Sep 15, 2017

Exploit:Java/CVE-2010-0094.CK

Detected by Microsoft Defender Antivirus

Aliases: Exploit.Java.CVE-2010-0094.o (Kaspersky) Java.Trojan.Downloader.OpenConnection.AJ (BitDefender) Java.Downloader.132 (Dr.Web) Troj/JavaDl-AZ (Sophos)

Summary

Exploit:Java/CVE-2010-0094.CK is the detection for malicious Java applet stored within a Java Archive (.JAR) that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 6 update 18. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to a host system, outside its "sandbox" environment.
 
The vulnerability exploits a flaw in the deserialization of "RMIConnectionImpl" objects, which allows remote attackers to call, without proper sandboxing, system level Java functions via the ClassLoader of a constructor that is being deserialized.
To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products will detect and remove this threat:
 
 
For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.
Update vulnerable applications
This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent your computer from being vulnerable to this malware, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links:
Follow us