rhsa-2011_1100
Vulnerability from csaf_redhat
Published
2011-07-27 14:49
Modified
2024-11-22 04:29
Summary
Red Hat Security Advisory: icedtea-web security update

Notes

Topic
Updated icedtea-web packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details
The IcedTea-Web project provides a Java web browser plug-in and an implementation of Java Web Start, which is based on the Netx project. It also contains a configuration tool for managing deployment settings for the plug-in and Web Start implementations. A flaw was discovered in the JNLP (Java Network Launching Protocol) implementation in IcedTea-Web. An unsigned Java Web Start application could use this flaw to manipulate the content of a Security Warning dialog box, to trick a user into granting the application unintended access permissions to local files. (CVE-2011-2514) An information disclosure flaw was discovered in the JNLP implementation in IcedTea-Web. An unsigned Java Web Start application or Java applet could use this flaw to determine the path to the cache directory used to store downloaded Java class and archive files, and therefore determine the user's login name. (CVE-2011-2513) All icedtea-web users should upgrade to these updated packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated icedtea-web packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The IcedTea-Web project provides a Java web browser plug-in and an\nimplementation of Java Web Start, which is based on the Netx project. It\nalso contains a configuration tool for managing deployment settings for the\nplug-in and Web Start implementations.\n\nA flaw was discovered in the JNLP (Java Network Launching Protocol)\nimplementation in IcedTea-Web. An unsigned Java Web Start application\ncould use this flaw to manipulate the content of a Security Warning\ndialog box, to trick a user into granting the application unintended access\npermissions to local files. (CVE-2011-2514)\n\nAn information disclosure flaw was discovered in the JNLP implementation in\nIcedTea-Web. An unsigned Java Web Start application or Java applet could\nuse this flaw to determine the path to the cache directory used to store\ndownloaded Java class and archive files, and therefore determine the user\u0027s\nlogin name. (CVE-2011-2513)\n\nAll icedtea-web users should upgrade to these updated packages, which\ncontain backported patches to correct these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:1100",
        "url": "https://access.redhat.com/errata/RHSA-2011:1100"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "718164",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718164"
      },
      {
        "category": "external",
        "summary": "718170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718170"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1100.json"
      }
    ],
    "title": "Red Hat Security Advisory: icedtea-web security update",
    "tracking": {
      "current_release_date": "2024-11-22T04:29:38+00:00",
      "generator": {
        "date": "2024-11-22T04:29:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2011:1100",
      "initial_release_date": "2011-07-27T14:49:00+00:00",
      "revision_history": [
        {
          "date": "2011-07-27T14:49:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-07-27T10:52:37+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T04:29:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.1.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 6)",
                  "product_id": "6Server-optional-6.1.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
                "product": {
                  "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
                  "product_id": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web-javadoc@1.0.4-2.el6_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
                "product": {
                  "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
                  "product_id": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web-debuginfo@1.0.4-2.el6_1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icedtea-web-0:1.0.4-2.el6_1.i686",
                "product": {
                  "name": "icedtea-web-0:1.0.4-2.el6_1.i686",
                  "product_id": "icedtea-web-0:1.0.4-2.el6_1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web@1.0.4-2.el6_1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
                "product": {
                  "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
                  "product_id": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web-javadoc@1.0.4-2.el6_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
                "product": {
                  "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
                  "product_id": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web-debuginfo@1.0.4-2.el6_1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "icedtea-web-0:1.0.4-2.el6_1.x86_64",
                "product": {
                  "name": "icedtea-web-0:1.0.4-2.el6_1.x86_64",
                  "product_id": "icedtea-web-0:1.0.4-2.el6_1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web@1.0.4-2.el6_1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "icedtea-web-0:1.0.4-2.el6_1.src",
                "product": {
                  "name": "icedtea-web-0:1.0.4-2.el6_1.src",
                  "product_id": "icedtea-web-0:1.0.4-2.el6_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/icedtea-web@1.0.4-2.el6_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-0:1.0.4-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686"
        },
        "product_reference": "icedtea-web-0:1.0.4-2.el6_1.i686",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-0:1.0.4-2.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src"
        },
        "product_reference": "icedtea-web-0:1.0.4-2.el6_1.src",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-0:1.0.4-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64"
        },
        "product_reference": "icedtea-web-0:1.0.4-2.el6_1.x86_64",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686"
        },
        "product_reference": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64"
        },
        "product_reference": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686"
        },
        "product_reference": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
        },
        "product_reference": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
        "relates_to_product_reference": "6Server-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-0:1.0.4-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686"
        },
        "product_reference": "icedtea-web-0:1.0.4-2.el6_1.i686",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-0:1.0.4-2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src"
        },
        "product_reference": "icedtea-web-0:1.0.4-2.el6_1.src",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-0:1.0.4-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64"
        },
        "product_reference": "icedtea-web-0:1.0.4-2.el6_1.x86_64",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686"
        },
        "product_reference": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64"
        },
        "product_reference": "icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686"
        },
        "product_reference": "icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
          "product_id": "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
        },
        "product_reference": "icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
        "relates_to_product_reference": "6Server-optional-6.1.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-2513",
      "discovery_date": "2011-06-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "718164"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to obtain the username and full path of the home and cache directories by accessing properties of the ClassLoader.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icedtea-web: home directory path disclosure to untrusted applications",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
          "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
          "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
          "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
          "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
          "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
          "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
          "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
          "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
          "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
          "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
          "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
          "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
          "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2513"
        },
        {
          "category": "external",
          "summary": "RHBZ#718164",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718164"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2513",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2513"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2513",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2513"
        }
      ],
      "release_date": "2011-07-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-27T14:49:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1100"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "icedtea-web: home directory path disclosure to untrusted applications"
    },
    {
      "cve": "CVE-2011-2514",
      "discovery_date": "2011-06-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "718170"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to trick victims into granting access to local files by modifying the content of the Java Web Start Security Warning dialog box to represent a different filename than the file for which access will be granted.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "icedtea-web: Java Web Start security warning dialog manipulation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
          "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
          "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
          "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
          "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
          "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
          "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
          "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
          "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
          "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
          "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
          "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
          "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
          "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2514"
        },
        {
          "category": "external",
          "summary": "RHBZ#718170",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718170"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2514",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2514"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2514",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2514"
        }
      ],
      "release_date": "2011-07-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-07-27T14:49:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1100"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.src",
            "6Server-optional-6.1.z:icedtea-web-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-debuginfo-0:1.0.4-2.el6_1.x86_64",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.i686",
            "6Server-optional-6.1.z:icedtea-web-javadoc-0:1.0.4-2.el6_1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "icedtea-web: Java Web Start security warning dialog manipulation"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.