First published: Fri Jun 19 2015(Updated: )
Andrea Palazzo reported the following problem affecting IcedTea-Web: """ When requesting authorization to run an unsigned applet, a warning message is prompted, indicating the domain from which the applet's code is being requested. It is possible to tamper with this value just supplying an arbitrary value as codebase. This issue could be exploited to abuse the eventual presence of whitelisted domains in the victim config (something like A 1434665367633 .* \Qhttp://trusted-site/\E) to gain unauthorized execution or to trick the user into allowing an application leveraging on the trust he could have for a well known domain. """ Acknowledgement: Name: Andrea Palazzo (Truel IT)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea-web | <1.5.3 | 1.5.3 |
redhat/icedtea-web | <1.6.1 | 1.6.1 |
Fedora | =21 | |
Fedora | =22 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Red Hat IcedTea | <=1.5.2 | |
Red Hat IcedTea | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5235 has a moderate severity level due to the potential for warning message spoofing when running unsigned applets.
To fix CVE-2015-5235, update IcedTea-Web to version 1.6.1 or later.
Versions of IcedTea-Web prior to 1.6.1 are affected by CVE-2015-5235.
When running unsigned applets, be cautious of potential spoofing of authorization warning messages due to CVE-2015-5235.
Yes, CVE-2015-5235 could potentially allow an attacker to manipulate warning messages shown to users.