Vulnerability Details : CVE-2003-1123
Potential exploit
Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.
Products affected by CVE-2003-1123
- cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-1123
14.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-1123
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-1123
-
http://www.kb.cert.org/vuls/id/393292
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/7824
Exploit;Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/12189
-
http://securitytracker.com/id?1006935
-
http://secunia.com/advisories/8958
About Secunia Research | Flexera
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1
Patch;Vendor Advisory
Jump to