Oracle Java docBase Parameter Buffer Overflow Exploit Update

The Java plugin for Internet Explorer (jp2iexp.dll) is affected by a stack-based buffer overflow when processing the docBase parameter of a Java applet. This can be exploited to execute arbitrary code with the privileges of the current user by enticing the victim to visit a malicious web page. This update adds DEP bypassing capability to the exploit, and adds support for Windows 7, Windows Server 2008, and Internet Explorer 8.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Thursday, November 4, 2010 - 19:00