openSUSE Security Update : icedtea-web (openSUSE-SU-2013:0893-1)

High Nessus Plugin ID 75010

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote openSUSE host is missing a security update.

Description

Changes in icedtea-web with update to 1.4 (bnc#818768) :

- Added cs, de, pl localization

- Splash screen for javaws and plugin

- Better error reporting for plugin via Error-splash-screen

- All IcedTea-Web dialogues are centered to middle of active screen

- Download indicator made compact for more then one jar

- User can select its own JVM via itw-settings and deploy.properties.

- Added extended applets security settings and dialogue

- Security updates

- CVE-2013-1926, RH916774: Class-loader incorrectly shared for applets with same relative-path.

- CVE-2013-1927, RH884705: fixed gifar vulnerabilit

- CVE-2012-3422, RH840592: Potential read from an uninitialized memory location

- CVE-2012-3423, RH841345: Incorrect handling of not 0-terminated strings

- NetX

- PR1027: DownloadService is not supported by IcedTea-Web

- PR725: JNLP applications will prompt for creating desktop shortcuts every time they are run

- PR1292: Javaws does not resolve versioned jar names with periods correctly

- Plugin

- PR1106: Buffer overflow in plugin table-

- PR1166: Embedded JNLP File is not supported in applet tag

- PR1217: Add command line arguments for plugins

- PR1189: Icedtea-plugin requires code attribute when using jnlp_href

- PR1198: JSObject is not passed to JavaScript correctly

- PR1260: IcedTea-Web should not rely on GTK

- PR1157: Applets can hang browser after fatal exception

- PR580: http://www.horaoficial.cl/ loads improperly

- Common

- PR1049: Extension jnlp's signed jar with the content of only META-INF/* is considered

- PR955: regression: SweetHome3D fails to run

- PR1145: IcedTea-Web can cause ClassCircularityError

- PR1161: X509VariableTrustManager does not work correctly with OpenJDK7

- PR822: Applets fail to load if jars have different signers

- PR1186:
System.getProperty('deployment.user.security.trusted.cac erts') is null

- PR909: The Java applet at http://de.gosupermodel.com/games/wardrobegame.jsp fails

- PR1299: WebStart doesn't read socket proxy settings from firefox correctly

Solution

Update the affected icedtea-web packages.

See Also

http://de.gosupermodel.com/games/wardrobegame.jsp

http://www.horaoficial.cl/

https://bugzilla.novell.com/show_bug.cgi?id=818768

https://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html

https://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html

Plugin Details

Severity: High

ID: 75010

File Name: openSUSE-2013-439.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2014/06/13

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:icedtea-web, p-cpe:/a:novell:opensuse:icedtea-web-debuginfo, p-cpe:/a:novell:opensuse:icedtea-web-debugsource, p-cpe:/a:novell:opensuse:icedtea-web-javadoc, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/05/10

Reference Information

CVE: CVE-2012-3422, CVE-2012-3423, CVE-2013-1926, CVE-2013-1927