Oracle Java docBase Parameter Buffer Overflow Exploit Update

The Java plugin for Internet Explorer (jp2iexp.dll) is affected by a stack-based buffer overflow when processing the docBase parameter of a Java applet. This can be exploited to execute arbitrary code with the privileges of the current user by enticing the victim to visit a malicious web page. This update adds DEP bypassing capability to the exploit, and adds support for Windows 7, Windows Server 2008, and Internet Explorer 8.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2010-3552
Product Version: 
10.5
Released Date: 
Friday, November 5, 2010 - 00:00