Vulnerabilities in Microsoft's Java implementation
by Jouko Pynnönen - Online Solutions Ltd. - Monday, 11 November 2002.
In most Java implementations there are a lot of native methods scattered in the core Java classes. Many of them are declared private so that an Applet can't directly invoke them. In some of these cases a hostile Applet may still call another method which in turn may pass some of the parameters to a private native method. If the parameters aren't checked adequately by the Java code passing them, an Applet might be able to do unwanted operations even if the native method doesn't have flaws.

Most of these vulnerabilities do not seem to originate from the original Sun Microsystem's code, but the modifications or additions made by Microsoft. Sun's Java Plug-in was tested against them but no knownly exploitable vulnerabilities seem to exist.

Any detailed technical information has been left out of this advisory in order to prevent exploitation of the vulnerabilities. Due to the educational value it may be published later.


Microsoft was first contacted in July 2002 and started their investigation of potential Java vulnerabilities. More of them were found during August and reported to the vendor. Microsoft has acknowledged most of the vulnerabilities and is currently working on a patch to correct them.

To protect themselves, Internet Explorer and Outlook (Express) users can disable Java Applets until the patch is released. This can be done in Internet Options -> Security -> Internet -> Custom Level -> Microsoft VM, select "Disable Java".

If you want to use an Applet on a certain web site you trust, you can add the site to the Trusted Sites zone and enable Applets in that zone.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th