The information in this article applies to:
SYMPTOMS
When a Java program is constructed by hand using a Java bytecodes assembler to operate outside the bounds set by the sandbox (the security scheme for Java programs), it may be possible for the program to exploit a security vulnerability in the Microsoft Virtual Machine (VM). If the program is hosted on a Web site, it may be possible to run a program or perform certain tasks on the computer of a visiting user that the user does not authorize. This may include creating, deleting, or modifying files, sending data to or receiving data from a Web site, or reformatting the hard disk.
RESOLUTIONA supported fix that corrects this problem is now available from Microsoft, but
it has not been fully regression tested and should be applied only to systems
experiencing this specific problem. http://www.microsoft.com/support/supportnet/overview/overview.aspThis hotfix has been posted to the following Microsoft Web site: http://www.microsoft.com/java/vm/dl_vm32.htm STATUSMicrosoft has confirmed this to be a problem in the Microsoft products listed at the beginning of this article. MORE INFORMATIONFor related information about this problem, please visit the following Microsoft Web site: http://www.microsoft.com/security/bulletins/ms99-045.aspFor additional security-related information about Microsoft products, please visit the following Microsoft Web site: http://www.microsoft.com/security/ Additional query words: applet
Keywords : win95 ntsecurity win98 kbbug4.00 kbfix4.00 |
Last Reviewed: October 25, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |