{"vuid":"VU#897529","idnumber":"897529","name":"Microsoft Virtual Machine allows untrusted applets to access the user.dir system property","keywords":["Microsoft","Java","Virtual Machine","getAbsolutePath()","user.dir","system property","MS02-069"],"overview":"Some versions of the Microsoft virtual machine (Microsoft VM) contain a flaw that could leak information about the user's system. This flaw could allow malicious Java applets to get information they would normally be denied access to.","clean_desc":"The Microsoft virtual machine (Microsoft VM) enables Java programs to run on Windows platforms. The Microsoft VM is included in most versions of Windows and Internet Explorer. System properties provide the means through which Java programs can query the operating system and gain detailed information about the system on which they are running. The Microsoft VM allows access to the user.dir system property from untrusted Java programs. A malicious Java applet that was designed to exploit this vulnerability could be hosted on an attacker's web page or delivered via HTML email.","impact":"A malicious program could exploit this vulnerability to disclose the path to the current working directory of the Microsoft VM-enabled application. Information contained in this path could provide additional information about the system, such as the user's username, that could be leveraged in other attacks.","resolution":"Apply a patch from the vendor Microsoft has issued Security Bulletin MS02-069 addressing this vulnerability. Users are encouraged to follow the instructions outlined in that bulletin and apply the patches that it refers to.","workarounds":"Workarounds Disable Java If the ability to run Java applets is not required or desired, configure your web browser to not execute them. Information about disabling Java in various web browsers can be found here. Note that disabling Java in your web browser may not mitigate this vulnerability for Java programs that are invoked via another method.","sysaffected":"","thanks":"Thanks to Jouko Pynnonen for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.iss.net/security_center/static/10581.php","http://www.securityfocus.com/bid/6139"],"cveids":["CVE-2002-1325"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-11-26T20:15:54Z","publicdate":"2002-11-12T21:54:47Z","datefirstpublished":"2003-01-21T21:59:33Z","dateupdated":"2003-01-21T21:59:39Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"15","cam_impact":"2","cam_easeofexploitation":"12","cam_attackeraccessrequired":"14","cam_scorecurrent":"1.512","cam_scorecurrentwidelyknown":"1.9845","cam_scorecurrentwidelyknownexploited":"3.8745","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.512,"vulnote":null}