Microsoft 'VM File Reading' Vulnerability patchMicrosoft has released a patch that eliminates a security vulnerability in the Microsoft? virtual machine (Microsoft VM). The vulnerability could enable a malicious web site operatorto read files fro | |
Download |
Microsoft 'VM File Reading' Vulnerability patch Ranking & Summary
Advertisement
Microsoft 'VM File Reading' Vulnerability patch Tags
- microsoft vulnerability checker vulnerability webpage vulnerability Microsoft Security Essentials LSASS vulnerability vulnerability detector create VM modify VM Detect Vulnerability Vulnerability Detection Microsoft ADPCM software vulnerability vulnerability report VM Vulnerability Finder Vulnerability Searcher Microsoft Longhorn VM prefetcher prefetch VM Microsoft Acropolis network vulnerability security vulnerability vulnerability tester test vulnerability Vulnerability Protection Vulnerability Analysis VM monitor monitor VM Web Vulnerability Scanner Web Vulnerability Messenger Vulnerability Vulnerability Assessment microsoft publish Informix Vulnerability Oracle Vulnerability Scan Vulnerability XSS vulnerability vulnerability update vulnerability news test web server vulnerability VM manager Vulnerability Scan Scan for Vulnerability Vulnerability Repair Repair Vulnerability vulnerability management SQL injection vulnerability VM administration vulnerability identification microsoft gratis descargar microsoft help microsoft Microsoft tooling Microsoft Glossaries microsoft TSE microsoft networks microsoft baseline security ana microsoft fixitfree microsoft activesync microsoft office2003 microsoft dyn
Microsoft 'VM File Reading' Vulnerability patch Description
Microsoft has released a patch that eliminates a security vulnerability in the Microsoft? virtual machine (Microsoft VM). The vulnerability could enable a malicious web site operatorto read files from the computer of a person who visited his site or read web content from inside an intranet if the malicious site is visited by a computer from within that intranet. In both cases the malicious applet would have toknow the exact name and location of the files. The Microsoft VM is a virtual machine for the Win32? operating environment. It runs atop Microsoft Windows? 95, 98 or Windows NT?. It ships as part of each operating system,and also as part of Microsoft Internet Explorer. The version of the Microsoft VM that ships with Microsoft Internet Explorer 4.x and Internet Explorer 5.x contains a securityvulnerability that could allow a Java applet to operate outside the bounds set by the sandbox. A malicious user could write a Java applet that could read - but not change, delete or add - files from the computer of a person who visited his site or read web content from inside an intranet if the malicious site is visited by a computer from within thatintranet. The malicious user would need to know the exactly path and filename of the files he wished to read.
Microsoft 'VM File Reading' Vulnerability patch Related Software