Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerability

vulnerability CVE-2012-3422 CVE-2012-3423

IcedTea-Web: memory corruptions

Synthesis of the vulnerability

An attacker can use two memory corruptions of IcedTea-Web, in order to stop the web bowser, or to execute code.
Impacted products: Fedora, MES, Mandriva Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform).
Severity: 3/4.
Creation date: 03/08/2012.
Identifiers: 840592, 841345, CVE-2012-3422, CVE-2012-3423, FEDORA-2012-14316, FEDORA-2012-14340, MDVSA-2012:122, openSUSE-SU-2012:0981-1, openSUSE-SU-2012:0982-1, openSUSE-SU-2013:0826-1, openSUSE-SU-2013:0893-1, openSUSE-SU-2013:0966-1, RHSA-2012:1132-01, SUSE-SU-2012:0979-1, SUSE-SU-2013:0851-1, SUSE-SU-2013:1174-1, VIGILANCE-VUL-11820.

Description of the vulnerability

The IcedTea-Web plugin implements Java Web Start for web browsers (Mozilla, Chrome, etc.). It is impacted by two vulnerabilities.

The get_cookie_info() and get_proxy_info() functions can call getFirstInTableInstance() with an uninitialized pointer. The usage of this pointer corrupts the memory. [severity:3/4; 840592, CVE-2012-3422]

The NPAPI (Netscape Plugin Application Programming Interface) does not ensure that strings of type NPVariant NPStrings ends with a '\0'. Mozilla uses '\0', but Chrome does not append a '\0'. The IcedTea-Web plugin can then receive unterminated strings coming from the browser. This leads to a read of an invalid memory area, or to a buffer overflow. [severity:3/4; 841345, CVE-2012-3423]

An attacker can therefore use two memory corruptions of IcedTea-Web, in order to stop the web bowser, or to execute code.
Complete Vigil@nce bulletin.... (free access)

Share this bulletin

Delicious Digg Facebook Google bookmarks LinkedIn Mail Reddit StumbleUpon Technorati Twitter 

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities database. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française