CVE-2000-0563
CVSS10.0
发布时间 :2000-10-20 00:00:00
修订时间 :2008-09-05 16:21:19
NMCOS    

[原文]The URLConnection function in MacOS Runtime Java (MRJ) 2.1 and earlier and the Microsoft virtual machine (VM) for MacOS allows a malicious web site operator to connect to arbitrary hosts using a HTTP redirection, in violation of the Java security model.


[CNNVD]多个供应商java.net.URLConnection分支程序直接连接漏洞(CNNVD-200010-123)

        MacOS Runtime Java (MRJ) 2.1版本及之前版本和MacOS的Microsoft虚拟机(VM)中的URLConnection函数存在漏洞。在Java安全模式的违反中,恶意网站操作者可以通过使用HTTP重定向来连接到任意主机。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0563
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0563
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200010-123
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/bugtraq/2000-06/0056.html
(VENDOR_ADVISORY)  BUGTRAQ  20000609 Security Holes Found in URLConnection of MRJ and IE of Mac OS (was Re: Reappearance of an old IE security bug)
http://www.securityfocus.com/bid/1336
(UNKNOWN)  BID  1336
http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-05-8&msg=391C95DE2DA.5E3BTAKAGI@java-house.etl.go.jp
(UNKNOWN)  BUGTRAQ  20000513 Re: Reappearance of an old IE security bug

- 漏洞信息

多个供应商java.net.URLConnection分支程序直接连接漏洞
危急 边界条件错误
2000-10-20 00:00:00 2005-10-20 00:00:00
远程※本地  
        MacOS Runtime Java (MRJ) 2.1版本及之前版本和MacOS的Microsoft虚拟机(VM)中的URLConnection函数存在漏洞。在Java安全模式的违反中,恶意网站操作者可以通过使用HTTP重定向来连接到任意主机。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 漏洞信息

7038
Mac OS Runtime Java URLConnection Arbitrary Host Access
Remote / Network Access
Loss of Confidentiality
Exploit Public

- 漏洞描述

Mac OS contains a flaw that may allow a malicious user to cause a victim to connect to an arbitrary host by an applet containing the java.net.URLConnection function. The issue is triggered when a malicious web site operator uses the URLConnection funtion to access data on arbitrary remote hosts, leading to a loss of confidentiality.

- 时间线

2000-05-13 Unknow
2000-05-13 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Multiple Vendors java.net.URLConnection Applet Direct Connection Vulnerability
Boundary Condition Error 1336
Yes Yes
2000-06-10 12:00:00 2009-07-11 02:56:00
Original bug posted to Bugtraq by Ben Mesander <bam@dimensional.com> on April 16, 2000. Additional information provided by Hiromitsu Takagi <takagi@etl.go.jp> on June 10, 2000.

- 受影响的程序版本

Alexander Clauss & iCab Company iCab 2.0 pre
- Apple Mac OS 7 7.1
- Apple Mac OS 7 7.0.1
- Apple Mac OS 7 7.0
- Apple Mac OS 8 8.5
- Apple Mac OS 8 8.0
- Apple Mac OS 9 9.0

- 漏洞讨论

The security model of Apple Mac OS Runtime Java (MRJ) is ignored in the function java.net.URLConnection. Therefore, it is possible to connect directly to any host whereas an applet should only be able to connect to the host that it originated from.

Hiromitsu Takagi &lt;takagi@etl.go.jp&gt; illustrates in the following article the dangers of any host being accessed:

http://java-house.etl.go.jp/ml/archive/j-h-b/033470.html

A malicious website operator could set up applets which could lend itself to download sensitive information in any data format given that the file and path is known.

This vulnerability depends on the combination of MRJ and browser version the system is running. To check whether or not your machine is vulnerable, make note of what version of browser and MRJ you are running and visit the following URL:

http://java-house.etl.go.jp/ml/archive/j-h-b/033471.html

- 漏洞利用

Hiromitsu Takagi &lt;takagi@etl.go.jp&gt; has set up the following web page to demonstrate this vulnerability:

http://java-house.etl.go.jp/~takagi/java/test/urlconnection-direct/Test.html

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站