Oracle Java SE Java Runtime Environment Code Execution Vulnerability - (Windows)

Summary
This host is installed with Oracle Java SE and is prone to code execution vulnerability.
Impact
Successful exploitation allows remote attackers to bypass the Java sandbox restriction and execute arbitrary code. Impact Level: System/Application
Solution
Apply the patch from below link http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
Insight
The 'AtomicReferenceArray' class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.
Affected
Oracle Java SE versions 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier
References