Описание
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
It was found that executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | icedtea-web | Out of support scope | ||
| Red Hat Enterprise Linux 7 | icedtea-web | Fixed | RHSA-2019:2003 | 31.07.2019 |
| Red Hat Enterprise Linux 8 | icedtea-web | Fixed | RHSA-2019:2004 | 31.07.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.3 Medium
CVSS3
Связанные уязвимости
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 e ...
It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
Уязвимость плагина IcedTea-Web, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю внедрить произвольный код в JAR-файл
EPSS
6.3 Medium
CVSS3