FIX: Microsoft VM applet vulnerability

Article translations Article translations
Article ID: 271752 - View products that this article applies to.
This article was previously published under Q271752
The Microsoft virtual machine (Microsoft VM) update that was previously listed in this article is no longer available. For more information, visit the following Microsoft Web pages:
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all


The Microsoft virtual machine (Microsoft VM) includes a vulnerability that could enable a malicious user to use an unsigned applet to read Web content behind a firewall. To exploit this vulnerability, the malicious user would have to know the exact URLs of the sites.

This affects the following builds of the Microsoft VM:
  • All builds in the 2000 series.
  • All builds in the 3100 series.
  • All builds in the 3200 series.
  • All builds in the 3300 series.


Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section. This problem was corrected in recent patches for the Microsoft VM.

See the "Resolution" section of this article for more information about the fixes.


For more information, please see Microsoft Security Bulletin MS00-059:
For more information, click the following article number to view the article in the Microsoft Knowledge Base:
253562 FIX: Untrusted code can access files on end-user systems
For additional security-related information about Microsoft products, please refer to the following Microsoft Web site:
For support information about Visual J++ and the SDK for Java, visit the following Microsoft Web site:


Article ID: 271752 - Last Review: January 7, 2015 - Revision: 4.0
  • Microsoft Java Virtual Machine
kbnosurvey kbarchive kbbug kbfix kbjavavm33xxfix kbsecbulletin kbsecurity kbsecvulnerability KB271752

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from