CVE-2015-5234
Published: 9 October 2015
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
Notes
Author | Note |
---|---|
mdeslaur | extended applets security was introduced in icedtea-web 1.4 |
Priority
Status
Package | Release | Status |
---|---|---|
icedtea-web Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not present)
|
trusty |
Released
(1.5.3-0ubuntu0.14.04.1)
|
|
upstream |
Released
(1.5.3)
|
|
vivid |
Released
(1.5.3-0ubuntu0.15.04.1)
|
|
wily |
Released
(1.5.3-0ubuntu0.15.10.1)
|
|
Patches: upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/53500e3de1bc upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/c9befa549f63 upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/5ddfe3e389ab upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/1a1cbf3b1123 |