The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to obtain the username and full path of the home and cache directories by accessing properties of the ClassLoader.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://icedtea.classpath.org/hg/release/icedtea-web-1.0/rev/b29fdd0f4d04 - | |
References | () http://icedtea.classpath.org/hg/release/icedtea-web-1.1/rev/c7ce6c0e6227 - | |
References | () http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2011-July/015170.html - Vendor Advisory | |
References | () http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2011-July/015171.html - Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2011-1100.html - | |
References | () http://securitytracker.com/id?1025854 - | |
References | () http://ubuntu.com/usn/usn-1178-1 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=718164 - |
Information
Published : 2014-05-14 00:55
Updated : 2024-11-21 01:28
NVD link : CVE-2011-2513
Mitre link : CVE-2011-2513
CVE.ORG link : CVE-2011-2513
JSON object : View
Products Affected
redhat
- icedtea6
- icedtea-web
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor