First published: Mon Jul 16 2012(Updated: )
An uninitialized pointer use flaw was found in IcedTea-Web web browser plugin. A malicious web page could use this flaw make IcedTea-Web browser plugin pass invalid pointer to a web browser. Depending on the browser used, it may cause the browser to crash or possibly execute arbitrary code. The get_cookie_info() and get_proxy_info() call getFirstInTableInstance() with the instance_to_id_map hash as a parameter. If instance_to_id_map is empty (which can happen when plugin was recently removed), getFirstInTableInstance() returns an uninitialized pointer. <a href="http://icedtea.classpath.org/hg/icedtea-web/file/01544fb82384/plugin/icedteanp/IcedTeaNPPlugin.cc#l292">http://icedtea.classpath.org/hg/icedtea-web/file/01544fb82384/plugin/icedteanp/IcedTeaNPPlugin.cc#l292</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea-web | <1.1.6 | 1.1.6 |
redhat/icedtea-web | <1.2.1 | 1.2.1 |
Red Hat IcedTea-Web | <=1.2 | |
Red Hat IcedTea-Web | =1.0 | |
Red Hat IcedTea-Web | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3422 is considered a moderate severity vulnerability due to the potential for browser crashes or arbitrary code execution.
To mitigate CVE-2012-3422, upgrade the IcedTea-Web plugin to version 1.2.1 or later.
CVE-2012-3422 affects IcedTea-Web versions prior to 1.2.1.
Yes, CVE-2012-3422 could allow a remote attacker to execute arbitrary code via specially crafted web pages.
Systems using affected versions of the IcedTea-Web plugin, mainly on Red Hat distributions, are vulnerable to CVE-2012-3422.