A vulnerability in the Windows DLL subcomponent of the Java SE component of Oracle Java SE could allow an unauthenticated, remote attacker to compromise a targeted system completely.
The vulnerability is due to improper input validation that is performed by the affected software. An attacker with network access to the system via multiple protocols could exploit the vulnerability by sending network packets that are designed to submit malicious input to the affected software. A successful exploit could allow the attacker to compromise the system completely.
Oracle confirmed the vulnerability and released software updates.
Security Impact Rating: Critical