MGASA-2015-0376

Source
https://advisories.mageia.org/MGASA-2015-0376.html
Import Source
https://advisories.mageia.org/MGASA-2015-0376.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0376
Related
Published
2015-09-17T18:02:40Z
Modified
2015-09-17T17:50:09Z
Summary
Updated icedtea-web packages fix security vulnerabilities
Details

Updated icedtea-web packages fix security vulnerabilities:

It was discovered that IcedTea-Web did not properly sanitize applet URLs when storing applet trust settings. A malicious web page could use this flaw to inject trust-settings configuration, and cause applets to be executed without user approval (CVE-2015-5234).

It was discovered that IcedTea-Web did not properly determine an applet's origin when asking the user if the applet should be run. A malicious page could use this flaw to cause IcedTea-Web to execute the applet without user approval, or confuse the user into approving applet execution based on an incorrectly indicated applet origin (CVE-2015-5235).

References
Credits

Affected packages

Mageia:5 / icedtea-web

Package

Name
icedtea-web
Purl
pkg:rpm/mageia/icedtea-web?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.3-1.mga5

Ecosystem specific

{
    "section": "core"
}