[arch-security] [ASA-201509-6] icedtea-web: multiple issues

Levente Polyak anthraxx at archlinux.org
Sun Sep 13 23:48:52 UTC 2015

Arch Linux Security Advisory ASA-201509-6

Severity: Medium
Date    : 2015-09-14
CVE-ID  : CVE-2015-5234 CVE-2015-5235
Package : icedtea-web
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE


The package icedtea-web before version 1.6.1-1 is vulnerable to multiple
authorization bypass vulnerabilities.


Upgrade to 1.6.1-1.

# pacman -Syu "icedtea-web>=1.6.1-1"

The problem has been fixed upstream in version 1.6.1.




- CVE-2015-5234 (unexpected permanent authorization of unsigned applets)

It was discovered that IcedTea-Web did not properly sanitize applet URLs
when storing applet trust settings. A malicious web page could use this
flaw to inject trust-settings configuration, and cause applets to be
executed without user approval.

- CVE-2015-5235 (applet origin spoofing)

It was discovered that IcedTea-Web did not properly determine an
applet's origin when asking the user if the applet should be run. A
malicious page could use this flaw to cause IcedTea-Web to execute the
applet without user approval, or confuse the user into approving applet
execution based on an incorrectly indicated applet origin.


A remote attacker is able to execute a malicious applet without user
approval via multiple vectors.



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150914/5265f1dd/attachment.asc>

More information about the arch-security mailing list