SuSE 11.3 Security Update : icedtea-web (SAT Patch Number 7981)

High Nessus Plugin ID 68953

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote SuSE 11 host is missing a security update.

Description

This update to IcedTea-Web 1.4 provides the following fixes and enhancements :

- Security updates

- RH916774: Class-loader incorrectly shared for applets with same relative-path. (CVE-2013-1926)

- RH884705: fixed gifar vulnerabilit. (CVE-2013-1927)

- RH840592: Potential read from an uninitialized memory location. (CVE-2012-3422)

- RH841345: Incorrect handling of not 0-terminated strings. (CVE-2012-3423)

- RH884705: fixed gifar vulnerability. (CVE-2013-1927)

- RH916774: Class-loader incorrectly shared for applets with same relative-path. (CVE-2013-1926)

- NetX

- PR1027: DownloadService is not supported by IcedTea-Web

- PR725: JNLP applications will prompt for creating desktop shortcuts every time they are run

- PR1292: Javaws does not resolve versioned jar names with periods correctly

- PR580: http://www.horaoficial.cl/ loads improperly.

- Plugin

- PR1106: Buffer overflow in plugin table-

- PR1166: Embedded JNLP File is not supported in applet tag

- PR1217: Add command line arguments for plugins

- PR1189: Icedtea-plugin requires code attribute when using jnlp_href

- PR1198: JSObject is not passed to JavaScript correctly

- PR1260: IcedTea-Web should not rely on GTK

- PR1157: Applets can hang browser after fatal exception

- PR580: http://www.horaoficial.cl/ loads improperly

- PR1260: IcedTea-Web should not rely on GTK

- PR1157: Applets can hang browser after fatal exception.

- Common

- PR1049: Extension jnlp's signed jar with the content of only META-INF/* is considered

- PR955: regression: SweetHome3D fails to run

- PR1145: IcedTea-Web can cause ClassCircularityError

- PR1161: X509VariableTrustManager does not work correctly with OpenJDK7

- PR822: Applets fail to load if jars have different signers

- PR1186:
System.getProperty('deployment.user.security.trusted.cac erts') is null

- PR909: The Java applet at http://de.gosupermodel.com/games/wardrobegame.jsp fails

- PR1299: WebStart doesn't read socket proxy settings from firefox correctly.

- Added cs, de, pl localization

- Splash screen for javaws and plugin

- Better error reporting for plugin via Error-splash-screen

- All IcedTea-Web dialogues are centered to middle of active screen

- Download indicator made compact for more then one jar

- User can select its own JVM via itw-settings and deploy.properties

- Added extended applets security settings and dialogue

- Added new option in itw-settings which allows users to set JVM arguments when plugin is initialized

- Fixed a build failure with older xulrunner

- Changed strict openjdk6 dependencies to anything java-openjdk >= 1.6.0.

Solution

Apply SAT patch number 7981.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=815596

https://bugzilla.novell.com/show_bug.cgi?id=818768

https://bugzilla.novell.com/show_bug.cgi?id=825880

http://support.novell.com/security/cve/CVE-2012-3422.html

http://support.novell.com/security/cve/CVE-2012-3423.html

http://support.novell.com/security/cve/CVE-2013-1926.html

http://support.novell.com/security/cve/CVE-2013-1927.html

Plugin Details

Severity: High

ID: 68953

File Name: suse_11_icedtea-web-130702.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2013/07/18

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:icedtea-web, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2013/07/02

Reference Information

CVE: CVE-2012-3422, CVE-2012-3423, CVE-2013-1926, CVE-2013-1927