{"api_version":"1","generated_at":"2026-04-23T08:03:54+00:00","cve":"CVE-2003-1229","urls":{"html":"https://cve.report/CVE-2003-1229","api":"https://cve.report/api/cve/CVE-2003-1229.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2003-1229","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2003-1229"},"summary":{"title":"CVE-2003-1229","description":"X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.","state":"PUBLISHED","assigner":"mitre","published_at":"2003-12-31 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-295","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1007483","name":"http://securitytracker.com/id?1007483","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"(HP Issues Fix for Virtualvault) Sun Java Secure Socket Extension (JSSE) May Incorrectly Authenticate Invalid Entities - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://java.sun.com/products/jsse/CHANGES.txt","name":"http://java.sun.com/products/jsse/CHANGES.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Oracle Java Technologies | Oracle","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html","name":"http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Neohapsis Archives - Bugtraq - Incorrect Certificate Validation in Java Secure Socket Extension - From a.loots_at_itsec-ss.nl","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/7943","name":"http://secunia.com/advisories/7943","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Vendor Advisory"],"title":"Secunia - Advisories - Java fails to validate certificates","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Vendor Advisory"],"title":"#50081: Incorrect Certificate Validation in Java Secure Socket Extension (JSSE), Java Plug-In and Java Web Start java.lang.NullPointerException","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11182","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11182","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1006007","name":"http://securitytracker.com/id?1006007","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"(HP Issues Fix) Sun Java Secure Socket Extension (JSSE) May Incorrectly Authenticate Invalid Entities - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1006001","name":"http://www.securitytracker.com/id?1006001","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Sun Java Secure Socket Extension (JSSE) May Incorrectly Authenticate Invalid Entities - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/6682","name":"http://www.securityfocus.com/bid/6682","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Third Party Advisory","VDB Entry"],"title":"Sun JSSE/Java Plug-In/Java Web Start Incorrect Certificate Validation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239","name":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2003-1229","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2003-1229","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2003","cve_id":"1229","vulnerable":"1","versionEndIncluding":"1.4.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2003","cve_id":"1229","vulnerable":"1","versionEndIncluding":"1.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"java_web_start","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2003","cve_id":"1229","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sun","cpe5":"jsse","cpe6":"1.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T02:19:45.929Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1006001","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1006001"},{"name":"1007483","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1007483"},{"name":"1006007","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1006007"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://java.sun.com/products/jsse/CHANGES.txt"},{"name":"HPSBUX0301-239","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239"},{"name":"sun-java-improper-validation(11182)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11182"},{"name":"7943","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/7943"},{"name":"6682","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/6682"},{"name":"oval:org.mitre.oval:def:5883","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883"},{"name":"50081","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1"},{"name":"20030128 Incorrect Certificate Validation in Java Secure Socket Extension","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2003-01-23T00:00:00.000Z","descriptions":[{"lang":"en","value":"X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1006001","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1006001"},{"name":"1007483","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1007483"},{"name":"1006007","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1006007"},{"tags":["x_refsource_CONFIRM"],"url":"http://java.sun.com/products/jsse/CHANGES.txt"},{"name":"HPSBUX0301-239","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239"},{"name":"sun-java-improper-validation(11182)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11182"},{"name":"7943","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/7943"},{"name":"6682","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/6682"},{"name":"oval:org.mitre.oval:def:5883","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883"},{"name":"50081","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1"},{"name":"20030128 Incorrect Certificate Validation in Java Secure Socket Extension","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2003-1229","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1006001","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1006001"},{"name":"1007483","refsource":"SECTRACK","url":"http://securitytracker.com/id?1007483"},{"name":"1006007","refsource":"SECTRACK","url":"http://securitytracker.com/id?1006007"},{"name":"http://java.sun.com/products/jsse/CHANGES.txt","refsource":"CONFIRM","url":"http://java.sun.com/products/jsse/CHANGES.txt"},{"name":"HPSBUX0301-239","refsource":"HP","url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0301-239"},{"name":"sun-java-improper-validation(11182)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11182"},{"name":"7943","refsource":"SECUNIA","url":"http://secunia.com/advisories/7943"},{"name":"6682","refsource":"BID","url":"http://www.securityfocus.com/bid/6682"},{"name":"oval:org.mitre.oval:def:5883","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5883"},{"name":"50081","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-50081-1"},{"name":"20030128 Incorrect Certificate Validation in Java Secure Socket Extension","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2003-01/0334.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2003-1229","datePublished":"2005-08-17T04:00:00.000Z","dateReserved":"2005-08-17T00:00:00.000Z","dateUpdated":"2024-08-08T02:19:45.929Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2003-12-31 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-295","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.0","versionEndIncluding":"1.4.1","matchCriteriaId":"FF497F0F-1E5C-4A09-AFC6-E288A12AC0B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java_web_start:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0","versionEndIncluding":"1.2","matchCriteriaId":"0F06D4B3-926F-4D30-ACF7-A9B334E29B11"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:jsse:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"432EB8F8-52C0-4FF3-97E5-92F670DFEE29"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2003","CveId":"1229","Ordinal":"1","Title":"CVE-2003-1229","CVE":"CVE-2003-1229","Year":"2003"},"notes":[{"CveYear":"2003","CveId":"1229","Ordinal":"1","NoteData":"X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.","Type":"Description","Title":"CVE-2003-1229"},{"CveYear":"2003","CveId":"1229","Ordinal":"2","NoteData":"2005-08-17","Type":"Other","Title":"Published"},{"CveYear":"2003","CveId":"1229","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}