Vulnerability Name:

CVE-2003-1229 (CCN-11182)

Assigned:2003-01-23
Published:2003-01-23
Updated:2022-09-13
Summary:X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-295
Vulnerability Consequences:Bypass Security
References:Source: BUGTRAQ
Type: Broken Link
20030128 Incorrect Certificate Validation in Java Secure Socket Extension

Source: CCN
Type: BugTraq Mailing List, Tue Jan 28 2003 - 02:04:29 CST
Incorrect Certificate Validation in Java Secure Socket Extension

Source: MITRE
Type: CNA
CVE-2003-1229

Source: CONFIRM
Type: Vendor Advisory
http://java.sun.com/products/jsse/CHANGES.txt

Source: CCN
Type: SA7943
Java fails to validate certificates

Source: SECUNIA
Type: Broken Link, Patch, Vendor Advisory
7943

Source: CCN
Type: SECTRACK ID: 1006001
Sun Java Secure Socket Extension (JSSE) May Incorrectly Authenticate Invalid Entities

Source: CCN
Type: SECTRACK ID: 1006007
(HP Issues Fix) Sun Java Secure Socket Extension (JSSE) May Incorrectly Authenticate Invalid Entities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1006007

Source: CCN
Type: SECTRACK ID: 1007483
(HP Issues Fix for Virtualvault) Sun Java Secure Socket Extension (JSSE) May Incorrectly Authenticate Invalid Entities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1007483

Source: CCN
Type: Sun Alert ID: 50081
Incorrect Certificate Validation in Java Secure Socket Extension (JSSE), Java Plug-In and Java Web Start

Source: SUNALERT
Type: Patch, Vendor Advisory
50081

Source: CCN
Type: OSVDB ID: 19786
Multiple Java Package X509TrustManager isClientTrusted Method Trust Failure

Source: BID
Type: Patch, Third Party Advisory, VDB Entry
6682

Source: CCN
Type: BID-6682
Sun JSSE/Java Plug-In/Java Web Start Incorrect Certificate Validation Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1006001

Source: HP
Type: Broken Link
HPSBUX0301-239

Source: XF
Type: Third Party Advisory, VDB Entry
sun-java-improper-validation(11182)

Source: XF
Type: UNKNOWN
sun-java-improper-validation(11182)

Source: OVAL
Type: Broken Link
oval:org.mitre.oval:def:5883

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sun:jre:1.4.0_02:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.1:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_05:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1a:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.0_02:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.1:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update5:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update2:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3_05:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3_02:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1:linux:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0.1_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4.1:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4.1:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update5:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_05:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update1:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update2:windows:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1_05:*:windows:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.0_02:*:linux:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.1:*:linux:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sun:jre:1.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.0.1_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.4.1:-:*:*:*:*:*:*
  • OR cpe:/a:sun:java_web_start:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update2:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.0:update5:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1:*:*:*:*:*:*
  • OR cpe:/a:sun:jre:1.3.1:update1a:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.4.0_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*
  • OR cpe:/a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*
  • AND
  • cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5883
    V
    Potential Sec. Vulnerability in Java VM, JSSE, Plug-in, and Webstart. (rev.1)
    2008-12-08
    BACK
    sun jre 1.4.0_02
    sun jre 1.3.1_03
    sun jdk 1.4.0_02
    sun java web start 1.0
    sun jdk 1.3.1_01
    sun jdk 1.3.0_05
    sun jre 1.4.1
    sun jdk 1.3.0_02
    sun jdk 1.3.1_03
    sun jdk 1.4
    sun jdk 1.3.1_03
    sun jre 1.4
    sun jdk 1.3.1_05
    sun jre 1.3.1_05
    sun jdk 1.4.1
    sun jre 1.4
    sun jre 1.3.1 update1a
    sun jdk 1.3.1_03
    sun jre 1.3.0
    sun jre 1.3.1_03
    sun java web start 1.2
    sun jre 1.4.0_02
    sun jre 1.3.1 update1
    sun jre 1.4.1
    sun jre 1.3.0 update5
    sun jdk 1.4
    sun jdk 1.3.1_05
    sun jdk 1.4.0_02
    sun jre 1.3.0 update2
    sun jdk 1.3_05
    sun jdk 1.3.0_05
    sun jdk 1.3.1_01a
    sun jre 1.3.0
    sun jdk 1.3_02
    sun jre 1.3.1
    sun jre 1.3.1 update1
    sun java web start 1.0.1_02
    sun jsse 1.0.3
    sun jdk 1.3
    sun jdk 1.3.1_05
    sun jdk 1.4.1
    sun jdk 1.3.0_02
    sun java web start 1.0.1
    sun jdk 1.4.1
    sun jre 1.3.0 update5
    sun jre 1.3.0 update2
    sun jre 1.3.0 update5
    sun jre 1.3.1_05
    sun jre 1.4
    sun jre 1.3.0 update1
    sun jre 1.3.0 update2
    sun jdk 1.3.1_01
    sun jdk 1.4
    sun jre 1.3.1_03
    sun jdk 1.4.0_02
    sun jre 1.3.1_05
    sun java web start 1.0.1_01
    sun jre 1.4.0_02
    sun jre 1.4.1
    sun jre 1.3.1
    sun java web start 1.0.1_01
    sun java web start 1.0.1
    sun java web start 1.0
    sun java web start 1.0.1_02
    sun sdk 1.4.0
    sun jre 1.4.0
    sun sdk 1.4.1
    sun jre 1.4.1
    sun java web start 1.2
    sun jsse 1.0.3
    sun jre 1.3.0
    sun jre 1.3.0 update2
    sun jre 1.3.0 update5
    sun jre 1.3.1 update1
    sun jre 1.3.1 update1a
    sun sdk 1.3.0
    sun sdk 1.3.1_01
    sun sdk 1.3.1_01a
    sun sdk 1.3.1_05
    sun sdk 1.4.0_02
    sun sdk 1.3.0_05
    sun sdk 1.3.0_02
    sun sdk 1.3.1_03
    hp hp-ux 11.00
    hp hp-ux 11.04
    hp hp-ux 11.11
    hp hp-ux 11.22