Vulnerability Note VU#140898
Microsoft Java implementation allows execution of malicious code
A class in Microsoft's Java virtual machine (VM) does not properly validate trusted applets, allowing untrusted applets to exploit native methods and execute arbitrary code.
Microsoft's Java VM is installed on Windows 98, NT, 2000, and xp. It is used by Internet Explorer and Outlook Express to execute Java applets.
The VM includes a class named "com.ms.osp.ospmrshl" that provides XML support to Java applets. This class exposes certain methods that are only intended to be accessed by trusted applets. However, the class does not check whether the applet is trusted before exposing these methods. Therefore, untrusted applets may access the methods and use them to execute arbitrary code on the client system.
A remote attacker may execute arbitrary code on a client running Internet Explorer or some configurations of Outlook Express.
Apply a patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||10 Oct 2002||11 Oct 2002|
CVSS Metrics (Learn More)
Thanks to Jouko Pynnonen for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: CAN-2002-0865
- Date Public: 09 Sep 2002
- Date First Published: 11 Oct 2002
- Date Last Updated: 13 Aug 2003
- Severity Metric: 19.84
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.