CVE-2002-0979
CVSS7.5
发布时间 :2002-09-24 00:00:00
修订时间 :2016-10-17 22:23:13
NMCOS    

[原文]The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.


[CNNVD]Microsoft Internet Explorer Java记录远程执行代码漏洞(CNNVD-200209-032)

        
        Microsoft Internet Explorer是一款微软开发的WEB浏览器,包含Microsoft JAVA虚拟机实现。
        Microsoft Internet Explorer中的Microsoft JAVA虚拟机JAVA记录功能存在问题,远程攻击者可以利用这个漏洞结合其他漏洞执行脚本代码。
        Microsoft JAVA虚拟机包含Java记录功能,你可以通过设置浏览器启动这个功能:
        工具->Internet选项->高级->启用JavaJava记录。
        这个功能是调用System.out.println()函数,不过这个函数会把JAVA错误记录如System.err.println输出到已知的系统目录下:
        %WINDIR%\java\javalog.txt
        结合利用其他漏洞"Microsoft Internet Explorer文件附件远程脚本执行漏洞"(http://www.nsfocus.com/index.php?act=sec_bug&do=view&bug_id=3317)可能导致把执行任意代码写入由Java记录生成的文件中,并以用户进程执行。
        这项功能在IE设置中不是默认开启。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0979
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0979
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200209-032
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=102961031107261&w=2
(UNKNOWN)  BUGTRAQ  20020817 Enableing java logging in MSIE is dangerous
http://www.iss.net/security_center/static/9886.php
(UNKNOWN)  XF  ie-javalogging-code-execution(9886)
http://www.securityfocus.com/bid/5491
(UNKNOWN)  BID  5491

- 漏洞信息

Microsoft Internet Explorer Java记录远程执行代码漏洞
高危 设计错误
2002-09-24 00:00:00 2005-10-20 00:00:00
远程  
        
        Microsoft Internet Explorer是一款微软开发的WEB浏览器,包含Microsoft JAVA虚拟机实现。
        Microsoft Internet Explorer中的Microsoft JAVA虚拟机JAVA记录功能存在问题,远程攻击者可以利用这个漏洞结合其他漏洞执行脚本代码。
        Microsoft JAVA虚拟机包含Java记录功能,你可以通过设置浏览器启动这个功能:
        工具->Internet选项->高级->启用JavaJava记录。
        这个功能是调用System.out.println()函数,不过这个函数会把JAVA错误记录如System.err.println输出到已知的系统目录下:
        %WINDIR%\java\javalog.txt
        结合利用其他漏洞"Microsoft Internet Explorer文件附件远程脚本执行漏洞"(http://www.nsfocus.com/index.php?act=sec_bug&do=view&bug_id=3317)可能导致把执行任意代码写入由Java记录生成的文件中,并以用户进程执行。
        这项功能在IE设置中不是默认开启。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 设置关闭"启用Java记录功能":
        在IE中设置:
        工具->Internet选项->高级->启用JavaJava记录
        确认没有打勾。
        厂商补丁:
        Microsoft
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.microsoft.com/windows/ie/default.asp

- 漏洞信息

7847
Microsoft IE JVM System.out.println Logging Arbitrary Command Execution

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-08-17 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Internet Explorer Java Logging Executable Code Vulnerability
Design Error 5491
Yes No
2002-08-17 12:00:00 2009-07-11 03:56:00
Vulnerability discovery credited to Jelmer <jelmer@kuperus.xs4all.nl>.

- 受影响的程序版本

Microsoft Internet Explorer 6.0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP2
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services SP1
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 2000 Terminal Services
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Terminal Server 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6a
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Datacenter Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Enterprise Edition Itanium 0
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Standard Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows Server 2003 Web Edition
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional

- 漏洞讨论

A problem with Microsoft Internet Explorer may provide a vector for the storage of malicious code within systems.

Under some circumstances, the java logging feature in Internet Explorer may provide a place for the storage of malicious code. When a page is visited by Internet Explorer, it may be possible to log executable code directly to the file created by java logging.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站