The information in this article applies to:
SYMPTOMSA scenario has been identified through which a Java applet can operate outside the bounds set by the sandbox and perform normally unauthorized functions on your computer. Exploiting the vulnerability is only possible through a very carefully managed series of steps, and cannot happen accidentally. However, if a malicious Web site operator hosts a Java applet that exploits this security vulnerability, it could read, write, or delete files on your computer when you visit the site. RESOLUTION
A supported fix that corrects this problem has been posted to the following Internet location: http://www.microsoft.com/java/vm/dl_vm40.htm STATUSMicrosoft has confirmed this to be a problem in the Microsoft products listed
at the beginning of this article.
This problem has been corrected in build 3234 of the Microsoft Virtual Machine (VM) that is included with Internet Explorer version 5.01. MORE INFORMATIONFor more information, please see the following Microsoft Security Bulletin: http://www.microsoft.com/security/bulletins/ms99-031faq.aspFor additional security-related information about Microsoft products, please go to: http://www.microsoft.com/security/ Additional query words: ie Patch Available for "Virtual Machine Sandbox" Vulnerability
Keywords : msiew95 msient msiew98 |
Last Reviewed: January 11, 2000 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |