First published: Tue Mar 19 2002(Updated: )
Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JRE | =1.3.1-update1a | |
Sun JRE | =1.1.8-update14 | |
Hp Java Jre-jdk | =1.1.8 | |
Hp Java Jre-jdk | =1.3 | |
Sun JRE | =1.1.8-update8 | |
Sun SDK | =1.2.2_10 | |
Sun JRE | =1.3.1-update1 | |
Sun JRE | =1.3.0-update5 | |
Sun SDK | =1.3.1_01 | |
Sun SDK | =1.3.1_01a | |
Microsoft Virtual Machine | =3802 | |
Sun JDK | =1.1.8-update14 | |
Sun JDK | =1.1.8-update8 | |
Sun SDK | =1.3_05 | |
Hp Java Jre-jdk | =1.2.2 | |
Sun SDK | =1.2.2_010 | |
Sun JRE | =1.2.2-update10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.