{"vuid":"VU#657625","idnumber":"657625","name":"Microsoft Virtual Machine incorrectly parses the domain portion of URLs containing a colon","keywords":["Microsoft","Virtual Machine","Java","applet","crafted URL","colon","domain"],"overview":"Some versions of the Microsoft virtual machine (Microsoft VM) contain a flaw that could allow untrusted Java applets from an attacker's site to be run instead of the trusted applet from the intended site.","clean_desc":"The Microsoft virtual machine (Microsoft VM) enables Java programs to run on Windows platforms. The Microsoft VM is included in most versions of Windows and Internet Explorer. The Microsoft VM contains a flaw that incorrectly parses URLs if they contain a colon used to indicate the port number. The vulnerability results because it's possible to create a URL that will cause the Microsoft VM to incorrectly determine the domain from which a Java applet was loaded, and conclude that it came from one web site when in fact it came from another. Specifically, if a URL is crafted in a particular format containing references to two different web sites, the VM will incorrectly process it and load a Java applet from an untrusted site while running it in the trusted site's domain. The crafted URL could be hosted on an attacker's web site or introduced to the user via an HTML email.","impact":"Because the malicious applet would be located in the context of the legitimate site's domain, it could potentially access any cookies that the legitimate site had placed on the victim user's system. Additionally, any information the malicious applet solicited from the user could be relayed back to the attacker's site instead of the intended site.","resolution":"Apply a patch from the vendor Microsoft has issued Security Bulletin MS02-069 addressing this vulnerability. Users are encouraged to follow the instructions outlined in the bulletin and apply the patches that it refers to.","workarounds":"Workarounds Disable Java - if the ability to run Java applets is not required or desired, configure your web browser to not execute them. Information about disabling Java in various web browsers can be found here. Note that disabling Java in your web browser may not mitigate this vulnerability for Java programs that are invoked via another method.","sysaffected":"","thanks":"Thanks to Jouko Pynnonen for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.iss.net/security_center/static/10579.php","http://www.securityfocus.com/bid/6142"],"cveids":["CVE-2002-1286"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-11-21T18:52:28Z","publicdate":"2002-11-12T21:54:47Z","datefirstpublished":"2003-01-21T21:54:26Z","dateupdated":"2003-01-21T21:56:49Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"15","cam_impact":"11","cam_easeofexploitation":"10","cam_attackeraccessrequired":"14","cam_scorecurrent":"7.363125","cam_scorecurrentwidelyknown":"9.52875","cam_scorecurrentwidelyknownexploited":"18.19125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.363125,"vulnote":null}