Lucene search

K
certCERTVU:307306
HistoryOct 11, 2002 - 12:00 a.m.

Microsoft Java implementation JDBC classes do not properly validate DLL requests

2002-10-1100:00:00
www.kb.cert.org
15

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.13

Percentile

95.5%

Overview

The Java Database Connectivity (JDBC) classes of Microsoft’s Java virtual machine (VM) do not properly validate DLL requests, allowing a malicious applet to load and execute any DLL on the client system.

Description

Microsoft’s Java VM is installed on Windows 98, NT, 2000, and XP. It is used by Internet Explorer and Outlook Express to execute Java applets.

The VM includes classes that provide JDBC functionality to Java applets. These classes do not properly validate requests to load and execute a DLL on the client system. Such requests are only to be honored if they come from applets that are authorized to load and execute DLLs. However, an unauthorized applet can send a request malformed in such a way that it will be accepted and honored by the JDBC classes. This vulnerability allows malicious Java applets to load and execute any DLL on the client system.


Impact

A malicious Java applet can load and execute any DLL on the client system.


Solution

Apply a patch

For more information, see:

<http://www.microsoft.com/technet/security/bulletin/MS02-052.asp&gt;


Vendor Information

307306

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Notified: October 10, 2002 Updated: October 11, 2002

Status

Affected

Vendor Statement

See:

<http://www.microsoft.com/technet/security/bulletin/MS02-052.asp&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23307306 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Jouko Pynnonen for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: CVE-2002-0866
Severity Metric: 18.43 Date Public:

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.13

Percentile

95.5%