Oracle Java JMX Remote Code Execution Exploit Update

The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This update adds support for Mac OS X 10.7.4 (i386).
Exploit type: 
Vulnerabilty ID: 
CVE-2013-0422
Product Version: 
2013_R2
Released Date: 
Tuesday, October 29, 2013 - 00:00