Ispravljena su dva sigurnosna propusta programskog paketa icedtea-web. Udaljeni napadač može ih iskoristiti za izvođenje napada uskraćivanjem usluge, otkrivanje osjetljivih informacija ili pokretanje proizvoljnog programskog koda.
Paket:
icedtea-web 1.x
Operacijski sustavi:
openSUSE 11.4, openSUSE 12.1
Kritičnost:
7.5
Problem:
pogreška u programskoj funkciji, pogreška u programskoj komponenti
Nedostaci su posljedica pogrešaka u funkciji "getFirstInTableInstance" te nepravilnog rukovanja NPVariant NPStrings znakovnim nizovima koji ne završavaju NUL oznakom.
Posljedica:
Ranjivosti je moguće iskoristiti za DoS napad, čitanje povjerljivih podataka iz memorije te za izvršavanje proizvoljnog programskog koda.
Rješenje:
Rješenje problema sigurnosti je nadogradnja paketa na novije inačice.
openSUSE Security Update: icedtea-web: Update to 1.2.1 (bnc#)
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0981-1
Rating: important
References: #773458
Cross-References: CVE-2012-3422 CVE-2012-3423
Affected Products:
openSUSE 12.1
openSUSE 11.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
- update to 1.2.1 (bnc#773458)
- Security Updates
* CVE-2012-3422, RH840592: Potential read from an
uninitialized memory location
* CVE-2012-3423, RH841345: Incorrect handling of not
0-terminated strings
- NetX
* PR898: signed applications with big jnlp-file doesn't
start (webstart affect like "frozen")
* PR811: javaws is not handling urls with spaces (and
other characters needing encoding) correctly
* 816592: icedtea-web not loading GeoGebra java applets
in Firefox or Chrome
- Plugin
* PR863: Error passing strings to applet methods in
Chromium
* PR895: IcedTea-Web searches for missing classes on each
loadClass or findClass
* PR518: NPString.utf8characters not guaranteed to be
nul-terminated
- Common
* RH838417: Disambiguate signed applet security prompt
from certificate warning
* RH838559: Disambiguate signed applet security prompt
from certificate warning
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.1:
zypper in -t patch openSUSE-2012-512
- openSUSE 11.4:
zypper in -t patch openSUSE-2012-512
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.1 (i586 x86_64):
icedtea-web-1.2.1-6.1
icedtea-web-debuginfo-1.2.1-6.1
icedtea-web-debugsource-1.2.1-6.1
- openSUSE 12.1 (noarch):
icedtea-web-javadoc-1.2.1-6.1
- openSUSE 11.4 (i586 x86_64):
icedtea-web-1.2.1-0.13.1
icedtea-web-debuginfo-1.2.1-0.13.1
icedtea-web-debugsource-1.2.1-0.13.1
- openSUSE 11.4 (noarch):
icedtea-web-javadoc-1.2.1-0.13.1
References:
http://support.novell.com/security/cve/CVE-2012-3422.html
http://support.novell.com/security/cve/CVE-2012-3423.html
https://bugzilla.novell.com/773458
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke