FKIE_CVE-2002-2281
Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Symantec Java! JIT (Just-In-Time) Compiler for Netscape Communicator 4.0 through 4.8 allows remote attackers to execute arbitrary Java commands via an applet that uses a jump call, which is not correctly compiled by the JIT compiler.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| symantec | java | 4.0 | |
| symantec | java | 4.4 | |
| symantec | java | 4.5 | |
| symantec | java | 4.06 | |
| symantec | java | 4.6 | |
| symantec | java | 4.07 | |
| symantec | java | 4.7 | |
| symantec | java | 4.08 | |
| symantec | java | 4.51 | |
| symantec | java | 4.61 | |
| symantec | java | 4.72 | |
| symantec | java | 4.73 | |
| symantec | java | 4.74 | |
| symantec | java | 4.75 | |
| symantec | java | 4.76 | |
| symantec | java | 4.77 | |
| symantec | java | 4.78 | |
| symantec | java | 4.79 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symantec:java:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A63CC1B9-7171-4A61-949F-3CD36D94AE30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "16C60758-82EB-4027-9331-C146B0402665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E29B5DAF-6A75-4A98-944D-F956907D9B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.06:*:*:*:*:*:*:*",
"matchCriteriaId": "030C255A-4E31-4813-9933-D75398B5EF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9490899F-94E1-45BF-B4FD-A534436F09B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.07:*:*:*:*:*:*:*",
"matchCriteriaId": "074C368D-73A6-4C44-955F-6520639575E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72B121CB-8EA7-4214-BB24-20A4F2FA5B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.08:*:*:*:*:*:*:*",
"matchCriteriaId": "9545FAD3-0E13-4E1E-8330-192880AD09A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.51:*:*:*:*:*:*:*",
"matchCriteriaId": "15C4E878-26F7-46C8-9AF7-7CD947607D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.61:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFD7CB9-9E0B-41A2-A86E-DAE418CB65AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.72:*:*:*:*:*:*:*",
"matchCriteriaId": "A610B095-649F-4165-9CFB-162FA305E3E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.73:*:*:*:*:*:*:*",
"matchCriteriaId": "2274515B-CFC3-471E-B228-1427B2AAB72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.74:*:*:*:*:*:*:*",
"matchCriteriaId": "ED444233-71CD-42D6-98D9-CF6B7E9ADE19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.75:*:*:*:*:*:*:*",
"matchCriteriaId": "FEC01324-18EA-48DA-AD65-DA7A42A96B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.76:*:*:*:*:*:*:*",
"matchCriteriaId": "64D9A939-A84A-4C94-9137-3D602C753809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.77:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD7DD07-5392-48FF-BCB9-D00B7902719A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.78:*:*:*:*:*:*:*",
"matchCriteriaId": "6D345876-0992-4914-8B41-24A1E054965F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:java:4.79:*:*:*:*:*:*:*",
"matchCriteriaId": "84B51327-5FAC-43F1-B371-5FB205482158",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Symantec Java! JIT (Just-In-Time) Compiler for Netscape Communicator 4.0 through 4.8 allows remote attackers to execute arbitrary Java commands via an applet that uses a jump call, which is not correctly compiled by the JIT compiler."
}
],
"id": "CVE-2002-2281",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=103798147613151\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/6222"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=103798147613151\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/6222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10711"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…