Microsoft KB Archive/300845

From BetaArchive Wiki
< Microsoft KB Archive
Revision as of 16:38, 18 July 2020 by 3155ffGd (talk | contribs) (importing KB archive)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Article ID: 300845

Article Last Modified on 3/29/2007



APPLIES TO

  • Microsoft Java Virtual Machine, when used with:
    • Microsoft Windows XP Professional
    • Microsoft Windows Millennium Edition
    • Microsoft Windows 2000 Standard Edition
    • Microsoft Windows NT 4.0
    • Microsoft Windows 98 Second Edition
    • Microsoft Windows 98 Standard Edition



This article was previously published under Q300845

IMPORTANT: This patch has been superseded by the update described in 810030

SYMPTOMS

A session hijacking vulnerability exists in the Microsoft virtual machine (Microsoft VM) that could allow a maliciously crafted Java applet to silently reroute all browser traffic to the host of the applet without the knowledge of the user. After an attacker possesses the rerouted browser traffic, he or she could take any action or any combination of actions that he or she chooses, including the following:

  • Handle the browser request.
  • Record the session information.
  • Forward the request to the intended destination.

NOTE: This capability could allow a malicious party to record the session information of a user and possibly search for user names, passwords, or credit card numbers that are sent in plain (unencrypted) text.

A malicious applet that tries to exploit this vulnerability would be active until the user quits all instances of Internet Explorer that are open.

This vulnerability can only be exploited if Microsoft Internet Explorer is configured to access Internet resources through a proxy server. Users whose browsers are not configured to use a proxy server are not at risk from this vulnerability.

If an attack that exploits this vulnerability captures any secure HTTP (HTTPS) traffic, the HTTPS traffic cannot be read in plain text because HTTPS is encrypted by using Secure Sockets Layer (SSL). Therefore, user names and passwords that are sent by using HTTPS are much less vulnerable than information that is sent in plain text by using HTTP.

CAUSE

This vulnerability occurs because of how certain requests for proxy service in Java are handled. When you configure Internet Explorer to use proxy services, a particularly crafted Java program (sometimes called an applet) could exploit this vulnerability to forward browser traffic.

RESOLUTION

To resolve this problem, install the "810030: Microsoft VM Security Update" package from the following Windows Update Web site:

. For additional information about this update, click the following article number to view the article in the Microsoft Knowledge Base:

810030 MS02-069: Flaw in Microsoft VM May Compromise Windows


STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in the Microsoft virtual machine. This problem was first corrected in Windows 2000 Service Pack 3.

MORE INFORMATION

To determine the Microsoft VM build number on a computer that is running Windows 98, Windows 98 Second Edition (SE), or Windows Millennium Edition (Me), follow these steps:

  1. Click Start, and then click Run.
  2. In the Open text box, type command, and then click OK.
  3. At the command prompt, type the following command, and then press ENTER:

    jview

    Notice that the version information appears on the first line as "Version n.nn.nnnn", where nnnn is the build number. For example, 5.00.3802 is Microsoft VM build 3802.

To determine the Microsoft VM build number on a computer that is running Windows NT 4.0, Windows 2000, or Windows XP, follow these steps:

  1. Click Start, and then click Run.
  2. In the Open text box, type cmd, and then click OK.
  3. At the command prompt, type the following command, and then press ENTER:

    jview

    Notice that the version information appears on the first line as "Version n.nn.nnnn", where nnnn is the build number. For example, 5.00.3802 is Microsoft VM build 3802.

For additional information about how to install the Microsoft VM silently without restarting your computer, click the following article number to view the article in the Microsoft Knowledge Base:

304930 How to Install the Microsoft Virtual Machine Silently Without Restarting Your Computer


To install the Microsoft VM build 3805 for Microsoft Windows 2000 (Hotfix) silently without restarting your computer, use the following command-line:

Q300845_W2K_SP3_X86_EN.exe -z -q -m


REFERENCES

For more information about this vulnerability, visit the following Microsoft Web sites:

For additional information about the Microsoft virtual machine, click the article number below to view the article in the Microsoft Knowledge Base:

169803 INFO: Historical List of Shipping Vehicles for Microsoft VM


For support information about Visual J++ and the SDK for Java, visit the following Microsoft Web site:


Additional query words: security_patch

Keywords: kbqfe kbbug kbfix kbjava kbsecbulletin kbsechack kbsecurity kbsecvulnerability kbwin2000sp3fix KB300845