CVE-2015-5234

Current Description

IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Basic Data

PublishedOctober 09, 2015
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSRedhatEnterprise Linux Desktop6.0*******
    2.3OSRedhatEnterprise Linux Hpc Node6.0*******
    2.3OSRedhatEnterprise Linux Server6.0*******
    2.3OSRedhatEnterprise Linux Workstation6.0*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSOpensuseOpensuse13.1*******
    2.3OSOpensuseOpensuse13.2*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatIcedtea********1.5.2
    2.3ApplicationRedhatIcedtea1.6*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFedoraprojectFedora21*******
    2.3OSFedoraprojectFedora22*******

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Icedtea *, 1.6
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Server 6.0
Opensuse Opensuse 13.1, 13.2
Fedoraproject Fedora 21, 22

References

NameSourceURLTags
FEDORA-2015-15676http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167120.htmlFEDORAThird Party Advisory
FEDORA-2015-15677http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167130.htmlFEDORAThird Party Advisory
openSUSE-SU-2015:1595http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.htmlSUSEThird Party Advisory
[distro-pkg-dev] 20150911 IcedTea-Web 1.6.1 and 1.5.3 releasedhttp://mail.openjdk.java.net/pipermail/distro-pkg-dev/2015-September/033546.htmlMLISTPatch
RHSA-2016:0778http://rhn.redhat.com/errata/RHSA-2016-0778.htmlREDHATThird Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlCONFIRM
1033780http://www.securitytracker.com/id/1033780SECTRACK
USN-2817-1http://www.ubuntu.com/usn/USN-2817-1UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=1233667https://bugzilla.redhat.com/show_bug.cgi?id=1233667CONFIRMIssue Tracking