Exploit:Java/CVE-2012-0507.R is a malicious Java applet that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to download and install files of an attacker's choice onto your computer. Versions of the JRE up to and including the following are vulnerable to this exploit:
- Version 7 update 2
- Version 6 update 30
- Version 5 update 33
To check if you're running a vulnerable version of Java:
- Go to the control panel (Select Start|Control Panel)
- Select Programs. If Java is installed you will see it in the list of installed programs. Click it to open the Java Control Panel.
- On the General tab, click About to see which version of Java you have installed.
Make sure that you install all available updates from the vendor in order to avoid this exploit. You can read more about this vulnerability and download software updates from these links:
Note: This detection may be triggered when you visit a website that contains the malicious code. Even if you are not using a vulnerable version of the JRE this detection may be reported when you visit a website that contains the malicious code. This does not mean that you have been compromised, but rather that an attempt to compromise your computer has been made.
Payload
Downloads and installs arbitrary files
If you visit a website containing the malicious code while using a vulnerable version of
Java,
Exploit:Java/ CVE-2012-0507.R is loaded. It then attempts to download and execute files from a remote host/URL. The files that are downloaded and executed could be any of the attacker's choice and could include additional malware. We have observed this exploit being used to download and install variants of the
Win32/Carberp family onto user's computers.
Win32/Carberp performs actions such as stealing online banking credentials, logging data from numerous software applications, downloading and executing arbitrary files, exporting installed certificates, capturing screen shots and logging keystrokes.
Additional technical details
In the wild, we have seen the following
Java class files included in malicious
Java archives:
- oemloader.class - detected as Exploit:Java/CVE-2012-0507.D!ldr
- mystart.class - detected as Exploit:Java/CVE-2012-0507.R
- At00micArray.class - detected as Exploit:Java/CVE-2012-0507.R
The vulnerability is related to an issue with the deserialization of "AtomicReferenceArray" objects, which allows remote attackers to call, without proper "sandboxing", system level Java functions via the ClassLoader of a constructor that is being deserialized. This means that the exploit is able to perform malicious actions that it would not normally have permission for.
The loader class creates another class file at runtime and loads it with elevated privileges. This class downloads and executes a binary file from a remote URL.
The downloaded file is saved and executed to %TEMP%\24kkk290347.exe.
Analysis by Elda Tan Seng