Vulnerability Note VU#792881
Microsoft Java implementation JDBC functions do not properly validate parameters
The Java Database Connectivity (JDBC) classes of Microsoft's Java virtual machine (VM) contain functions that do not properly validate parameters. A malicious Java applet can exploit this vulnerability to crash programs on the client system.
Microsoft's Java VM is installed on Windows 98, NT, 2000, and XP. It is used by Internet Explorer and Outlook Express to execute Java applets.
The VM includes classes that provide JDBC functionality to Java applets. Certain functions in these classes do not properly validate their parameters. By specifying invalid parameter handles, a malicious applet can cause programs running the VM (such as Internet Explorer) to crash. It may also be possible to execute arbitrary code on the client system, though this has not been demonstrated or proven.
A malicious applet can cause the VM and dependent programs such as Internet Explorer to crash.
Apply a patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||10 Oct 2002||26 Aug 2004|
CVSS Metrics (Learn More)
Thanks to Jouko Pynnonen for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: CAN-2002-0867
- Date Public: 09 Sep 2002
- Date First Published: 11 Oct 2002
- Date Last Updated: 26 Aug 2004
- Severity Metric: 11.34
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.