First published: Wed Jul 18 2012(Updated: )
It was discovered that the IcedTea-Web web browser plugin incorrectly assumed that all strings provided by browser are NUL terminated, which is not guaranteed by the NPAPI (Netscape Plugin Application Programming Interface). When used in a browser that does not NUL terminate NPVariant NPStrings, this could lead to buffer over-read or over-write, resulting in possible information leak, crash, or code execution. Mozilla browsers currently NUL terminate strings, however recent Chrome versions are known not to provide NUL terminated data. Related upstream bug reports and commits: <a href="http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518">http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518</a> <a href="http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863">http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863</a> <a href="http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076">http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076</a> <a href="http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9">http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea-web | <1.1.6 | 1.1.6 |
redhat/icedtea-web | <1.2.1 | 1.2.1 |
Red Hat IcedTea-Web | <=1.2 | |
Red Hat IcedTea-Web | =1.0 | |
Red Hat IcedTea-Web | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3423 has a medium severity rating due to potential security implications when dealing with untrusted input.
To fix CVE-2012-3423, update IcedTea-Web to version 1.1.6 or 1.2.1 or higher.
CVE-2012-3423 affects versions of IcedTea-Web prior to 1.1.6 and 1.2.1.
Yes, CVE-2012-3423 can cause application crashes if non-NUL terminated strings are processed.
CVE-2012-3423 can affect any web browser that utilizes the IcedTea-Web plugin which fails to handle NPVariant NPStrings correctly.