Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-5234

Published: 9 October 2015

IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Notes

AuthorNote
mdeslaur
extended applets security was introduced in icedtea-web 1.4

Priority

Medium

Status

Package Release Status
icedtea-web
Launchpad, Ubuntu, Debian
precise Not vulnerable
(code not present)
trusty
Released (1.5.3-0ubuntu0.14.04.1)
upstream
Released (1.5.3)
vivid
Released (1.5.3-0ubuntu0.15.04.1)
wily
Released (1.5.3-0ubuntu0.15.10.1)
Patches:
upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/53500e3de1bc
upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/c9befa549f63
upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/5ddfe3e389ab
upstream: http://icedtea.classpath.org/hg/icedtea-web/rev/1a1cbf3b1123