The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malicious site within the security context of the site that is being visited by the user.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/657625 | third party advisory us government resource |
http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 | mailing list |
http://www.securityfocus.com/bid/6142 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10579 | vdb entry |
http://marc.info/?l=bugtraq&m=103682630823080&w=2 | mailing list |