Vulnerability Note VU#307306

Microsoft Java implementation JDBC classes do not properly validate DLL requests

Original Release date: 11 Oct 2002 | Last revised: 07 Nov 2003


The Java Database Connectivity (JDBC) classes of Microsoft's Java virtual machine (VM) do not properly validate DLL requests, allowing a malicious applet to load and execute any DLL on the client system.


Microsoft's Java VM is installed on Windows 98, NT, 2000, and XP. It is used by Internet Explorer and Outlook Express to execute Java applets.

The VM includes classes that provide JDBC functionality to Java applets. These classes do not properly validate requests to load and execute a DLL on the client system. Such requests are only to be honored if they come from applets that are authorized to load and execute DLLs. However, an unauthorized applet can send a request malformed in such a way that it will be accepted and honored by the JDBC classes. This vulnerability allows malicious Java applets to load and execute any DLL on the client system.


A malicious Java applet can load and execute any DLL on the client system.


Apply a patch

For more information, see:

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected10 Oct 200211 Oct 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Jouko Pynnonen for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: CAN-2002-0866
  • Date Public: 09 Sep 2002
  • Date First Published: 11 Oct 2002
  • Date Last Updated: 07 Nov 2003
  • Severity Metric: 18.43
  • Document Revision: 4


If you have feedback, comments, or additional information about this vulnerability, please send us email.