First published: Fri Jul 01 2011(Updated: )
Omair Majid discovered a flaw in the JNLP (Java Network Launching Protocol) implementation used in IcedTea-web. An unsigned Java Web Start application could use this flaw to manipulate content of the Security Warning dialog to show different file name than the one access to which was requested by the applications. This could confuse user to grant unintended access to local files. Note: This issue does not affect JNLP implementation as currently used in IcedTea, as it contains older version of the code that does not include file name in the access request prompt. Instead the prompt says "The application has requested (read|write) access to a file on the machine. Do you want to allow this action?", which does not allow user to determine which file the application requests access to.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Icedtea-web | =1.0.2 | |
Redhat Icedtea-web | <=1.0.3 | |
Redhat Icedtea-web | =1.1 | |
Redhat Icedtea-web | =1.0.1 | |
Redhat Icedtea-web | =1.0 | |
Redhat Icedtea6 | =1.9.2 | |
Redhat Icedtea6 | =1.8.4 | |
Redhat Icedtea6 | =1.9.6 | |
Redhat Icedtea6 | =1.8.5 | |
Redhat Icedtea6 | =1.8.3 | |
Redhat Icedtea6 | =1.8.2 | |
Redhat Icedtea6 | =1.8.1 | |
Redhat Icedtea6 | =1.9.3 | |
Redhat Icedtea6 | =1.9.4 | |
Redhat Icedtea6 | =1.9.1 | |
Redhat Icedtea6 | =1.8 | |
Redhat Icedtea6 | =1.8.6 | |
Redhat Icedtea6 | =1.9.5 | |
Redhat Icedtea6 | =1.9.8 | |
Redhat Icedtea6 | <=1.8.8 | |
Redhat Icedtea6 | =1.8.7 | |
Redhat Icedtea6 | =1.9.7 | |
redhat/icedtea-web | <1.0.4 | 1.0.4 |
redhat/icedtea-web | <1.1.1 | 1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.