A vulnerability exists in certain versions of Sun's Java Runtime Environment, and potentially in JREs from other vendors having been derived from Sun's Java Development Kit source tree. Untrusted Java code may be able to calls to classes which would normally not be permitted. As a result, a malicious applet could potentially be used, for example, to compromise the security of a host system visiting an attacker's web site. The original Sun Microsystems advisory does not provide further specific details of this vulnerability.
A vulnerability exists in certain versions of Sun's Java Runtime Environment, and potentially in JREs from other vendors having been derived from Sun's Java Development Kit source tree. Untrusted Java code may be able to calls to classes which would normally not be permitted. As a result, a malicious applet could potentially be used, for example, to compromise the security of a host system visiting an attacker's web site. The original Sun Microsystems advisory does not provide further specific details of this vulnerability.