First published: Fri Jun 19 2015(Updated: )
Andrea Palazzo reported the following problem affecting IcedTea-Web: """ When requesting authorization to run an unsigned applet, a warning message is prompted, indicating the domain from which the applet's code is being requested. It is possible to tamper with this value just supplying an arbitrary value as codebase. This issue could be exploited to abuse the eventual presence of whitelisted domains in the victim config (something like A 1434665367633 .* \Qhttp://trusted-site/\E) to gain unauthorized execution or to trick the user into allowing an application leveraging on the trust he could have for a well known domain. """ Acknowledgement: Name: Andrea Palazzo (Truel IT)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/icedtea-web | <1.5.3 | 1.5.3 |
redhat/icedtea-web | <1.6.1 | 1.6.1 |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Hpc Node | =6 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Redhat Icedtea | <=1.5.2 | |
Redhat Icedtea | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.