Computer Security
[EN] securityvulns.ru no-pyccku


IcedTea for Java OpenJDK protection bypass
Published:02.02.2011
Source:
SecurityVulns ID:11393
Type:library
Threat Level:
5/10
Description:Protection bypass in JNLP SecurityManage, JAR files digital signature spoofing.
Affected:REDHAT : IcedTea 1.7
 REDHAT : IcedTea 1.8
 REDHAT : IcedTea 1.9
CVE:CVE-2011-0025 (IcedTea 1.7 before 1.7.8, 1.8 before 1.8.5, and 1.9 before 1.9.5 does not properly verify signatures for JAR files that (1) are "partially signed" or (2) signed by multiple entities, which allows remote attackers to trick users into executing code that appears to come from a trusted source.)
 CVE-2010-4351 (The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.)
Original documentdocumentUBUNTU, [USN-1055-1] OpenJDK vulnerabilities (02.02.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod