Oracle Java docBase Parameter Buffer Overflow Exploit

The Java plugin for Internet Explorer is affected by a stack-based buffer overflow when processing the docBase parameter of a Java applet. This can be exploited to execute arbitrary code with the privileges of the current user by enticing the victim to visit a malicious web page. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2010-3552
Product Version: 
10.5
Released Date: 
Wednesday, October 13, 2010 - 00:00