Description
The loadClass method of the sun.applet.AppletClassLoader class in the Java Virtual Machine (JVM) in Sun SDK and JRE 1.4.1_03 and earlier allows remote attackers to bypass sandbox restrictions and execute arbitrary code via a loaded class name that contains "/" (slash) instead of "." (dot) characters, which bypasses a call to the Security Manager's checkPackageAccess method.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T02:05:12.818Z
Reserved: 2003-10-24T00:00:00.000Z
Link: CVE-2003-0896
No data.
Status : Deferred
Published: 2003-11-17T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2003-0896
No data.
OpenCVE Enrichment
No data.
Weaknesses