Vulnerability Note VU#792881

Microsoft Java implementation JDBC functions do not properly validate parameters

Original Release date: 11 Oct 2002 | Last revised: 26 Aug 2004


The Java Database Connectivity (JDBC) classes of Microsoft's Java virtual machine (VM) contain functions that do not properly validate parameters. A malicious Java applet can exploit this vulnerability to crash programs on the client system.


Microsoft's Java VM is installed on Windows 98, NT, 2000, and XP. It is used by Internet Explorer and Outlook Express to execute Java applets.

The VM includes classes that provide JDBC functionality to Java applets. Certain functions in these classes do not properly validate their parameters. By specifying invalid parameter handles, a malicious applet can cause programs running the VM (such as Internet Explorer) to crash. It may also be possible to execute arbitrary code on the client system, though this has not been demonstrated or proven.


A malicious applet can cause the VM and dependent programs such as Internet Explorer to crash.


Apply a patch

For more information, see:

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected10 Oct 200226 Aug 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Jouko Pynnonen for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: CAN-2002-0867
  • Date Public: 09 Sep 2002
  • Date First Published: 11 Oct 2002
  • Date Last Updated: 26 Aug 2004
  • Severity Metric: 11.34
  • Document Revision: 8


If you have feedback, comments, or additional information about this vulnerability, please send us email.