search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Java implementation JDBC functions do not properly validate parameters

Vulnerability Note VU#792881

Original Release Date: 2002-10-11 | Last Revised: 2004-08-26


The Java Database Connectivity (JDBC) classes of Microsoft's Java virtual machine (VM) contain functions that do not properly validate parameters. A malicious Java applet can exploit this vulnerability to crash programs on the client system.


Microsoft's Java VM is installed on Windows 98, NT, 2000, and XP. It is used by Internet Explorer and Outlook Express to execute Java applets.

The VM includes classes that provide JDBC functionality to Java applets. Certain functions in these classes do not properly validate their parameters. By specifying invalid parameter handles, a malicious applet can cause programs running the VM (such as Internet Explorer) to crash. It may also be possible to execute arbitrary code on the client system, though this has not been demonstrated or proven.


A malicious applet can cause the VM and dependent programs such as Internet Explorer to crash.


Apply a patch

For more information, see:

Vendor Information


Microsoft Corporation Affected

Notified:  October 10, 2002 Updated: August 26, 2004



Vendor Statement


Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Jouko Pynnonen for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: CVE-2002-0867
Severity Metric: 11.34
Date Public: 2002-09-09
Date First Published: 2002-10-11
Date Last Updated: 2004-08-26 16:28 UTC
Document Revision: 8

Sponsored by CISA.