It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Icedtea-web | Icedtea-web_project | * | 1.7.2 (including) |
Icedtea-web | Icedtea-web_project | 1.8.2 (including) | 1.8.2 (including) |
Red Hat Enterprise Linux 7 | RedHat | icedtea-web-0:1.7.1-2.el7_6 | * |
Red Hat Enterprise Linux 8 | RedHat | icedtea-web-0:1.7.1-17.el8_0 | * |
Icedtea-web | Ubuntu | bionic | * |
Icedtea-web | Ubuntu | devel | * |
Icedtea-web | Ubuntu | disco | * |
Icedtea-web | Ubuntu | eoan | * |
Icedtea-web | Ubuntu | esm-apps/bionic | * |
Icedtea-web | Ubuntu | esm-apps/focal | * |
Icedtea-web | Ubuntu | esm-apps/jammy | * |
Icedtea-web | Ubuntu | esm-apps/noble | * |
Icedtea-web | Ubuntu | esm-apps/xenial | * |
Icedtea-web | Ubuntu | focal | * |
Icedtea-web | Ubuntu | groovy | * |
Icedtea-web | Ubuntu | hirsute | * |
Icedtea-web | Ubuntu | impish | * |
Icedtea-web | Ubuntu | jammy | * |
Icedtea-web | Ubuntu | kinetic | * |
Icedtea-web | Ubuntu | lunar | * |
Icedtea-web | Ubuntu | mantic | * |
Icedtea-web | Ubuntu | noble | * |
Icedtea-web | Ubuntu | oracular | * |
Icedtea-web | Ubuntu | trusty | * |
Icedtea-web | Ubuntu | upstream | * |
Icedtea-web | Ubuntu | xenial | * |