6.8
CVSSv2

CVE-2012-4540

Published: 11/11/2012 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x prior to 1.1.7, 1.2.x prior to 1.2.2, 1.3.x prior to 1.3.1, and 1.4.x prior to 1.4.1 allows remote malicious users to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 13.2

opensuse opensuse 13.1

redhat icedtea-web 1.1.2

redhat icedtea-web 1.1.1

redhat icedtea-web 1.1.6

redhat icedtea-web 1.1.5

redhat icedtea-web 1.2.1

redhat icedtea-web 1.1

redhat icedtea-web 1.2

redhat icedtea-web 1.3

redhat icedtea-web 1.1.4

redhat icedtea-web 1.1.3

Vendor Advisories

Synopsis Critical: icedtea-web security update Type/Severity Security Advisory: Critical Topic Updated icedtea-web packages that fix one security issue are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact A Common Vulnera ...
Debian Bug report logs - #692608 [CVE-2012-4540] icedtea-web: buffer overflow in IcedTeaScriptableJavaObject::invoke Package: icedtea-web; Maintainer for icedtea-web is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Luciano Bello <luciano@debianorg> Date: Wed, 7 Nov 2012 21:03:0 ...
The Icedtea-Web plugin could be made to crash or run programs as your login if it opened a specially crafted web page ...
A heap-based buffer overflow vulnerability was found in icedtea-web, a web browser plugin for running applets written in the Java programming language If a user were tricked into opening a malicious website, an attacker could cause the plugin to crash or possibly execute arbitrary code as the user invoking the program This problem was initially d ...

References