Arch Linux Security Advisory ASA-201509-6
=========================================

Severity: Medium
Date    : 2015-09-14
CVE-ID  : CVE-2015-5234 CVE-2015-5235
Package : icedtea-web
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package icedtea-web before version 1.6.1-1 is vulnerable to multiple
authorization bypass vulnerabilities.

Resolution
==========

Upgrade to 1.6.1-1.

# pacman -Syu "icedtea-web>=1.6.1-1"

The problem has been fixed upstream in version 1.6.1.

Workaround
==========

None.

Description
===========

- CVE-2015-5234 (unexpected permanent authorization of unsigned applets)

It was discovered that IcedTea-Web did not properly sanitize applet URLs
when storing applet trust settings. A malicious web page could use this
flaw to inject trust-settings configuration, and cause applets to be
executed without user approval.

- CVE-2015-5235 (applet origin spoofing)

It was discovered that IcedTea-Web did not properly determine an
applet's origin when asking the user if the applet should be run. A
malicious page could use this flaw to cause IcedTea-Web to execute the
applet without user approval, or confuse the user into approving applet
execution based on an incorrectly indicated applet origin.

Impact
======

A remote attacker is able to execute a malicious applet without user
approval via multiple vectors.

References
==========

http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2015-September/033546.html
https://access.redhat.com/security/cve/CVE-2015-5234
https://access.redhat.com/security/cve/CVE-2015-5235

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to