![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11635 |
Category: | Windows |
Title: | Java Media Framework (JMF) Vulnerability |
Summary: | NOSUMMARY |
Description: | Description: The remote host is using Sun Microsystems's Java Media Framework (JMF). There is a bug in the version installed which may allow an untrusted applet to crash the Java Virtual Machine it is being run on, or even to gain unauthorized privileges. An attacker could exploit this flaw to execute arbitrary code on this host. To exploit this flaw, the attacker would need to send a rogue java applet to a user of the remote host and have him execute it (since Java applets are running in a sandbox, a user may probably feel safe executing it). Solution : Upgrade to JMF 2.1.1e or newer Risk : Medium |
Copyright | This script is Copyright (C) 2003 Tenable Network Security |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |