CVE-2003-1229

X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:jsse:1.0.3:*:*:*:*:*:*:*

History

09 Feb 2024, 03:26

Type Values Removed Values Added
First Time Oracle jre
Oracle
References (SECTRACK) http://securitytracker.com/id?1007483 - Third Party Advisory, VDB Entry (SECTRACK) http://securitytracker.com/id?1007483 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://java.sun.com/products/jsse/CHANGES.txt - Vendor Advisory (CONFIRM) http://java.sun.com/products/jsse/CHANGES.txt - Broken Link, Vendor Advisory
References (SECTRACK) http://securitytracker.com/id?1006007 - Third Party Advisory, VDB Entry (SECTRACK) http://securitytracker.com/id?1006007 - Broken Link, Third Party Advisory, VDB Entry
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1 - Patch, Vendor Advisory (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1 - Broken Link, Patch, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id?1006001 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id?1006001 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/6682 - Patch, Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/6682 - Broken Link, Patch, Third Party Advisory, VDB Entry
CPE cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_05:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.0_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_05:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:1.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.1:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:1.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update1a:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_05:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:1.0.1_02:*:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4.1:*:linux:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3_02:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.1:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.0_02:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.1:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.4.0_02:*:linux:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update1:linux:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3_05:*:solaris:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*
cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*
cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*

Information

Published : 2003-12-31 05:00

Updated : 2024-02-28 10:24


NVD link : CVE-2003-1229

Mitre link : CVE-2003-1229

CVE.ORG link : CVE-2003-1229


JSON object : View

Products Affected

oracle

  • jre

sun

  • jsse
  • java_web_start
CWE
CWE-295

Improper Certificate Validation