CVE-2000-0711 : Détail

CVE-2000-0711

2.82%V3
Network
2000-10-13
02h00 +00:00
2005-11-02
09h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim's system via a malicious applet, as demonstrated by Brown Orifice.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 20139

Date de publication : 2000-08-02 22h00 +00:00
Auteur : Alexey Yarovinsky
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/1545/info A set of flaws in multiple vendors' Java implementation allows a malicious applet to open a listening socket to accept network connections against the security policy. Java applications use the java.net.ServerSocket class to create a listening network socket on which to accept network connections. The server socket class should use the SecurityManager.checkListen() method to determine whether a class is allowed to create a server side listening socket. A SecurityException should be thrown if the class is not allowed to create such socket. By default untrusted classes such as applets should not be allowed to create such sockets. The implementation of Java fails to throw a SecurityException when an applet create a ServerSocket. After a ServerSocket object has been created an application must accept network connections by called the ServerSocket.accept() method or by subclassing the ServerSocket class an using the ServerSocket.implAccept() method of ServerSocket to implement their own accept method. The ServerSocket.accept() method normally calls the SecurityManager.checkAccept() method to determine if a class can accept a server connection. The ServerSocket.accept() and the ServerSocket.implAccept() methods both accept the network connection before determining if the class can accept the connection. This is done to determine the remote address and remote port number of the connection. If the connection should not be accepted these methods shutdown the connection by calling the socket's Socket.close() method, and then throwing a SecurityException. Because the ServerSocket.implAccept() method takes as an argument a Socket object to use for the connection a malicious class can pass it an object which is subclass of the Socket class that overloads its close() method not to close the socket. By then ignoring the SecurityException the malicious class can now accept the connection and make use of the socket. Sun's implementation of the ServerSocket.implAccept() method seems to have closed the second vulnerability by calling the Socket.impl.close() method instead of the Socket.close() method. By combining these two flaws a malicious applet can accept connections from any host. Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20140.tar.gz

Products Mentioned

Configuraton 0

Microsoft>>Virtual_machine >> Version 2000

    Microsoft>>Virtual_machine >> Version 3100

      Microsoft>>Virtual_machine >> Version 3200

        Microsoft>>Virtual_machine >> Version 3300

          Netscape>>Communicator >> Version 4.0

          Netscape>>Communicator >> Version 4.04

          Netscape>>Communicator >> Version 4.05

          Netscape>>Communicator >> Version 4.5

          Netscape>>Communicator >> Version 4.06

          Netscape>>Communicator >> Version 4.6

          Netscape>>Communicator >> Version 4.07

          Netscape>>Communicator >> Version 4.7

          Netscape>>Communicator >> Version 4.08

          Netscape>>Communicator >> Version 4.51

          Netscape>>Communicator >> Version 4.61

          Netscape>>Communicator >> Version 4.72

          Netscape>>Communicator >> Version 4.73

          Netscape>>Communicator >> Version 4.74

          Références

          http://www.securityfocus.com/bid/1545
          Tags : vdb-entry, x_refsource_BID
          http://www.cert.org/advisories/CA-2000-15.html
          Tags : third-party-advisory, x_refsource_CERT