CVE Vulnerabilities

CVE-2019-10181

Insufficient Verification of Data Authenticity

Published: Jul 31, 2019 | Modified: Nov 21, 2024
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
6.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

NameVendorStart VersionEnd Version
Icedtea-webIcedtea-web_project*1.7.2 (including)
Icedtea-webIcedtea-web_project1.8.2 (including)1.8.2 (including)
Red Hat Enterprise Linux 7RedHaticedtea-web-0:1.7.1-2.el7_6*
Red Hat Enterprise Linux 8RedHaticedtea-web-0:1.7.1-17.el8_0*
Icedtea-webUbuntubionic*
Icedtea-webUbuntudevel*
Icedtea-webUbuntudisco*
Icedtea-webUbuntueoan*
Icedtea-webUbuntuesm-apps/bionic*
Icedtea-webUbuntuesm-apps/focal*
Icedtea-webUbuntuesm-apps/jammy*
Icedtea-webUbuntuesm-apps/noble*
Icedtea-webUbuntuesm-apps/xenial*
Icedtea-webUbuntufocal*
Icedtea-webUbuntugroovy*
Icedtea-webUbuntuhirsute*
Icedtea-webUbuntuimpish*
Icedtea-webUbuntujammy*
Icedtea-webUbuntukinetic*
Icedtea-webUbuntulunar*
Icedtea-webUbuntumantic*
Icedtea-webUbuntunoble*
Icedtea-webUbuntuoracular*
Icedtea-webUbuntuplucky*
Icedtea-webUbuntuquesting*
Icedtea-webUbuntutrusty*
Icedtea-webUbuntuupstream*
Icedtea-webUbuntuxenial*

References