Microsoft Corp. on Wednesday released a patch for a critical new flaw in its Virtual Machine Java implementation that gives an attacker the ability to run code on a vulnerable computer.
The Virtual Machine is included in nearly every version of Windows as well as in most version of Internet Explorer.
The vulnerability is in the ByteCode Verifier component of the VM, which is part of the class-verification process. The component does not correctly check for the presence of some malicious code as Java applets are loaded.
The most likely way for an attacker to exploit this flaw is by creating a malicious Java applet, embedding it in a Web page and then either enticing a user to visit the page or e-mailing the page to the user.
The patch for this vulnerability is available here.
The Redmond, Wash., company also released a fix for a problem in both the Winsock Proxy service in Proxy Server 2.0 and the firewall service in the ISA Server 2000. If an attacker sent a specially crafted packet to a vulnerable machine, the packet would cause a denial-of-service condition.
The patch for this issue is here.
Latest Security News:
Search for more stories by Dennis Fisher.
Find white papers on security.