Second Microsoft VM Flaw Found

Microsoft Corp. this week turned its recent patch for the Microsoft Virtual Machine into a cumulative patch.

A second critical flaw was discovered in the Microsoft Virtual Machine that could allow a malicious user to create a Java applet that executes code on a user's machine outside the Java "sandbox."

This adds to a critical flaw that prompted Microsoft to issue the patch in the first place at the beginning of March. That flaw could allow an attacker to view information on a user's machine. The original flaw only affected Internet Explorer users browsing behind proxy servers, a category that includes most of the corporate world.

The more recently discovered vulnerability is a variant of the Virtual Machine Verifier bug that Microsoft addressed in a 1999 patch. An attacker must post the malicious Java applet on a Web site and entice a user to execute the applet for the attack to work. Once the applet runs, the only constraints on the attacker's ability to execute code is the user's privileges.

The Microsoft Virtual Machine is available for all current Windows clients back to Windows 95 and all versions of Internet Explorer.

The Microsoft VM figures prominently in the lawsuit Sun Microsystems recently filed against Microsoft.

Microsoft's security bulletin is located at

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Windows Admin Center vs. Hyper-V Manager: What's Better for Managing VMs?

    Microsoft's preferred interface for Windows Server is Windows Admin Center, but can it really replace Hyper-V Manager for managing virtual machines? Brien compares the two management tools.

  • Microsoft Offers More Help on Windows Server 2008 Upgrades

    Microsoft this week published additional help resources for organizations stuck on Windows Server 2008, which fell out of support on Jan. 14.

  • Microsoft Ups Its Carbon Reduction Goals

    Microsoft on Thursday announced a corporatewide carbon reduction effort that aims to make the company "carbon negative" by 2030.

  • How To Dynamically Lock Down an Unattended Windows 10 PC

    One of the biggest security risks in any organization happens when a user walks away from their PC without logging out. Microsoft has the solution (and it's not a password-protected screensaver).

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.