First published: Mon Oct 22 2012(Updated: )
A flaw was reported in IcedTea-web plugin where certain events attached to an applet, when triggered, could lead to a heap-based buffer overflow, resulting in possible information leak, crash, or code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea-web | <1.1.7 | 1.1.7 |
redhat/icedtea-web | <1.2.2 | 1.2.2 |
redhat/icedtea-web | <1.3.1 | 1.3.1 |
redhat/icedtea-web | <1.4.1 | 1.4.1 |
openSUSE libeconf | =13.1 | |
openSUSE libeconf | =13.2 | |
Red Hat IcedTea-Web | =1.1 | |
Red Hat IcedTea-Web | =1.1.1 | |
Red Hat IcedTea-Web | =1.1.2 | |
Red Hat IcedTea-Web | =1.1.3 | |
Red Hat IcedTea-Web | =1.1.4 | |
Red Hat IcedTea-Web | =1.1.5 | |
Red Hat IcedTea-Web | =1.1.6 | |
Red Hat IcedTea-Web | =1.2 | |
Red Hat IcedTea-Web | =1.2.1 | |
Red Hat IcedTea-Web | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4540 is classified as a high severity vulnerability due to its potential for heap-based buffer overflow, which can lead to code execution.
To fix CVE-2012-4540, upgrade IcedTea-web to versions 1.1.7, 1.2.2, 1.3.1, or 1.4.1 as recommended by the vendor.
Affected versions of IcedTea-web include all versions prior to 1.1.7, 1.2.2, 1.3.1, and 1.4.1.
CVE-2012-4540 can be exploited to trigger a heap-based buffer overflow, resulting in potential information leakage, application crashes, or arbitrary code execution.
CVE-2012-4540 affects platforms running specific versions of IcedTea-web on Red Hat and openSUSE distributions.