CVE-2002-0076
Published Mar 19, 2002
Last updated 6 years ago
Overview
- Description
- Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:java_jre-jdk:1.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B5D2FA9-8C0B-4018-8EE3-6BF79E182DB0" }, { "criteria": "cpe:2.3:a:hp:java_jre-jdk:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19ABD387-E3C6-49E3-9E8B-46ED7D70DA6C" }, { "criteria": "cpe:2.3:a:hp:java_jre-jdk:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC61EC3-7299-41F3-9CBC-15D86F515266" }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6" }, { "criteria": "cpe:2.3:a:sun:jdk:1.1.8:update14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E58C529E-0D46-46A2-A6F3-894ECB215A65" }, { "criteria": "cpe:2.3:a:sun:jdk:1.1.8:update8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4053D51D-57A9-495F-9B8D-0076661283EC" }, { "criteria": "cpe:2.3:a:sun:jre:1.1.8:update14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3375977-9C9F-48C6-80D6-7BC26389BE3E" }, { "criteria": "cpe:2.3:a:sun:jre:1.1.8:update8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC661221-300B-4730-A26E-33DD10355E23" }, { "criteria": "cpe:2.3:a:sun:jre:1.2.2:update10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F330C06-5DAA-433F-B1AB-71362E328095" }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75" }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB" }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04FB9247-7DB5-46A1-9E99-C25A729FB5D7" }, { "criteria": "cpe:2.3:a:sun:sdk:1.2.2_10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47627A45-F60E-46E5-BD9C-AE67CF6B5D39" }, { "criteria": "cpe:2.3:a:sun:sdk:1.2.2_010:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9998A074-A556-4A8B-A0CE-3355AF78C3CA" }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416" }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9" }, { "criteria": "cpe:2.3:a:sun:sdk:1.3_05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50E18066-F22D-48D3-A7BD-A51F68052BDF" } ], "operator": "OR" } ] } ]