First published: Fri Jul 01 2011(Updated: )
Omair Majid discovered an information disclosure flaw in the JNLP (Java Network Launching Protocol) implementation used in IcedTea and IcedTea-web. An unsigned Java Web Start application or Java Applet could use this flaw to determine a path to the cache directory (/home/<username>/.netx/cache/) used to store downloaded jars for Web Start application or Applet by querying class's ClassLoader properties. This discloses full path to user's home directory on the local system and user's login name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea-web | <1.0.4 | 1.0.4 |
redhat/icedtea-web | <1.1.1 | 1.1.1 |
Red Hat IcedTea-Web | =1.0.2 | |
Red Hat IcedTea-Web | <=1.0.3 | |
Red Hat IcedTea-Web | =1.1 | |
Red Hat IcedTea-Web | =1.0.1 | |
Red Hat IcedTea-Web | =1.0 | |
Red Hat IcedTea6 | =1.9.2 | |
Red Hat IcedTea6 | =1.8.4 | |
Red Hat IcedTea6 | =1.9.6 | |
Red Hat IcedTea6 | =1.8.5 | |
Red Hat IcedTea6 | =1.8.3 | |
Red Hat IcedTea6 | =1.8.2 | |
Red Hat IcedTea6 | =1.8.1 | |
Red Hat IcedTea6 | =1.9.3 | |
Red Hat IcedTea6 | =1.9.4 | |
Red Hat IcedTea6 | =1.9.1 | |
Red Hat IcedTea6 | =1.8 | |
Red Hat IcedTea6 | =1.8.6 | |
Red Hat IcedTea6 | =1.9.5 | |
Red Hat IcedTea6 | =1.9.8 | |
Red Hat IcedTea6 | <=1.8.8 | |
Red Hat IcedTea6 | =1.8.7 | |
Red Hat IcedTea6 | =1.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-2513 is classified as medium due to potential information disclosure.
To fix CVE-2011-2513, update the IcedTea-web package to version 1.0.4 or higher.
CVE-2011-2513 affects IcedTea-web versions up to 1.1.1 and certain older versions of IcedTea.
CVE-2011-2513 can be exploited by an attacker using an unsigned Java Web Start application to disclose the path to the cache directory.
CVE-2011-2513 is less of a concern in modern systems using updated Java implementations, but caution is advised with legacy applications.