First published: Wed Jul 31 2019(Updated: )
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Icedtea-web Project Icedtea-web | <=1.7.2 | |
Icedtea-web Project Icedtea-web | =1.8.2 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10181 is a vulnerability found in icedtea-web up to and including versions 1.7.2 and 1.8.2.
CVE-2019-10181 allows an attacker to inject executable code in a trusted JAR file without compromising the signature verification.
The severity of CVE-2019-10181 is high, with a severity value of 8.1.
Icedtea-web versions up to and including 1.7.2 and 1.8.2 are affected by CVE-2019-10181, as well as Debian Linux 8.0 and openSUSE Leap 15.0.
To fix CVE-2019-10181, it is recommended to update icedtea-web to a version higher than 1.8.2 and apply any available security patches for the affected operating systems.