It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
{
"binaries": [
{
"binary_version": "1.6.2-3ubuntu1",
"binary_name": "icedtea-8-plugin"
},
{
"binary_version": "1.6.2-3ubuntu1",
"binary_name": "icedtea-netx"
},
{
"binary_version": "1.6.2-3ubuntu1",
"binary_name": "icedtea-netx-common"
},
{
"binary_version": "1.6.2-3ubuntu1",
"binary_name": "icedtea-plugin"
}
]
}{
"binaries": [
{
"binary_version": "1.8-0ubuntu8~18.04",
"binary_name": "icedtea-8-plugin"
},
{
"binary_version": "1.8-0ubuntu8~18.04",
"binary_name": "icedtea-netx"
},
{
"binary_version": "1.8-0ubuntu8~18.04",
"binary_name": "icedtea-netx-common"
},
{
"binary_version": "1.8-0ubuntu8~18.04",
"binary_name": "icedtea-plugin"
}
]
}