Home Malware Programs Malware Exploit:Java/CVE-2011-3521.A

Exploit:Java/CVE-2011-3521.A

Posted: April 4, 2012

Threat Metric

Threat Level: 1/10
Infected PCs: 35
First Seen: April 4, 2012
OS(es) Affected: Windows

Exploit:Java/CVE-2011-3521.A (also identified as simply CVE-2011-3521) is a type confusion exploit that abuses Java's object recognition system to attack your PC. Because Exploit:Java/CVE-2011-3521.A can be used to run a malicious code that can enable the installation of PC threats or create other attacks against your computer, any risk of exposure to Exploit:Java/CVE-2011-3521.A should be warded off by appropriate anti-malware programs that can detect and remove Exploit:Java/CVE-2011-3521.A's potential payload in instances where Exploit:Java/CVE-2011-3521.A isn't blocked outright from its attack. Exploit:Java/CVE-2011-3521.A has been patched out out of recent versions of JavaScript, but SpywareRemove.com malware researchers warn that earlier versions of Java are still vulnerable to Exploit:Java/CVE-2011-3521.A-enabled assaults, which may launch themselves without visible symptoms.

How Exploit:Java/CVE-2011-3521.A Juggles Java Classifications to Turn Them into Open Season on Your Computer

Exploit:Java/CVE-2011-3521.A functions by storing invalid data in object containers that normally would be negated by Java's built-in security measures, which are bypassed due to selective targeting of Java components where object type-checking is absent or easily circumvented. This same basic philosophy has also been applied to other Java exploits, such as CVE-2012-0507, but the consequence of a successful attack is always the same: the execution of a hostile code that enables other attacks against your PC. Since Exploit:Java/CVE-2011-3521.A can't function without JavaScript, SpywareRemove.com malware researchers suggest that you disable Java when it's not required or even delete Java entirely if you don't require its features (which are commonly used on various websites).

Other than any initial loading displays that Java itself might provide, or warnings from your security software, Exploit:Java/CVE-2011-3521.A attacks will not provide any default symptoms that you can use to recognize their actions. Such exploits are often embedded onto malicious websites or third-party advertisements, but they may also be formatted to run as a file that you would need to launch manually. Exploits like Exploit:Java/CVE-2011-3521.A can be used to:

  • Install Trojans, rootkits, spyware or other harmful software onto your hard drive.
  • Redirect your browser to a hostile site.
  • Force your PC to open remotely-stored files or launch remote scripts.

Hacking Your Way Through the JavaScript Jungle of Exploit:Java/CVE-2011-3521.A

Exploit:Java/CVE-2011-3521.A has been removed from JavaScript as of update 29, and you should be safe from this particular exploit (if not necessarily similar ones) as long as you keep Java updated. Because the most common method of distribution for Java exploits like Exploit:Java/CVE-2011-3521.A is through hostile sites, SpywareRemove.com malware researchers warn against any interaction with suspicious sites that use exploitable scripts, which should be identifiable if you use appropriate security settings for your browser.

Exploit:Java/CVE-2011-3521.A is classified as a high-level danger by the vulnerability analysis team of the United States' Department of Homeland Security, and Exploit:Java/CVE-2011-3521.A should never be taken lightly despite the minimal nature of its visible symptoms. Attacks by Exploit:Java/CVE-2011-3521.A can result in the installation of extremely dangerous PC threats and should always be prevented by suitable anti-malware software and basic web-browsing safety protocol whenever possible.

Technical Details

Additional Information

The following URL's were detected:
direct-pdf.com

One Comment

Loading...