CVE-2012-3423

The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
References
Link Resource
http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518
http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863 Vendor Advisory
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.1/NEWS
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9 Exploit Patch
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076 Exploit Patch
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html
http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html
http://rhn.redhat.com/errata/RHSA-2012-1132.html
http://secunia.com/advisories/50089 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.ubuntu.com/usn/USN-1521-1
https://bugzilla.redhat.com/show_bug.cgi?id=841345
http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518
http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863 Vendor Advisory
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.1/NEWS
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9 Exploit Patch
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076 Exploit Patch
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html
http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html
http://rhn.redhat.com/errata/RHSA-2012-1132.html
http://secunia.com/advisories/50089 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://www.ubuntu.com/usn/USN-1521-1
https://bugzilla.redhat.com/show_bug.cgi?id=841345
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518 - () http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518 -
References () http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863 - Vendor Advisory () http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863 - Vendor Advisory
References () http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.1/NEWS - () http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.1/NEWS -
References () http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9 - Exploit, Patch () http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9 - Exploit, Patch
References () http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076 - Exploit, Patch () http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076 - Exploit, Patch
References () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html - () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html -
References () http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html - () http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html -
References () http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html - () http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html -
References () http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html - () http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1132.html - () http://rhn.redhat.com/errata/RHSA-2012-1132.html -
References () http://secunia.com/advisories/50089 - Vendor Advisory () http://secunia.com/advisories/50089 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201406-32.xml - () http://security.gentoo.org/glsa/glsa-201406-32.xml -
References () http://www.ubuntu.com/usn/USN-1521-1 - () http://www.ubuntu.com/usn/USN-1521-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=841345 - () https://bugzilla.redhat.com/show_bug.cgi?id=841345 -

Information

Published : 2012-08-07 21:55

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3423

Mitre link : CVE-2012-3423

CVE.ORG link : CVE-2012-3423


JSON object : View

Products Affected

redhat

  • icedtea-web
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer