The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability CVE-2012-3422 CVE-2012-3423

IcedTea-Web: memory corruptions

Synthesis of the vulnerability

An attacker can use two memory corruptions of IcedTea-Web, in order to stop the web bowser, or to execute code.
Impacted products: Fedora, MES, Mandriva Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform).
Severity: 3/4.
Creation date: 03/08/2012.
Identifiers: 840592, 841345, CVE-2012-3422, CVE-2012-3423, FEDORA-2012-14316, FEDORA-2012-14340, MDVSA-2012:122, openSUSE-SU-2012:0981-1, openSUSE-SU-2012:0982-1, openSUSE-SU-2013:0826-1, openSUSE-SU-2013:0893-1, openSUSE-SU-2013:0966-1, RHSA-2012:1132-01, SUSE-SU-2012:0979-1, SUSE-SU-2013:0851-1, SUSE-SU-2013:1174-1, VIGILANCE-VUL-11820.

Description of the vulnerability

The IcedTea-Web plugin implements Java Web Start for web browsers (Mozilla, Chrome, etc.). It is impacted by two vulnerabilities.

The get_cookie_info() and get_proxy_info() functions can call getFirstInTableInstance() with an uninitialized pointer. The usage of this pointer corrupts the memory. [severity:3/4; 840592, CVE-2012-3422]

The NPAPI (Netscape Plugin Application Programming Interface) does not ensure that strings of type NPVariant NPStrings ends with a '\0'. Mozilla uses '\0', but Chrome does not append a '\0'. The IcedTea-Web plugin can then receive unterminated strings coming from the browser. This leads to a read of an invalid memory area, or to a buffer overflow. [severity:3/4; 841345, CVE-2012-3423]

An attacker can therefore use two memory corruptions of IcedTea-Web, in order to stop the web bowser, or to execute code.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities database. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.