CVE-2011-2514
Published May 14, 2014
Last updated 10 years ago
Overview
- Description
- The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to trick victims into granting access to local files by modifying the content of the Java Web Start Security Warning dialog box to represent a different filename than the file for which access will be granted.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0AAB67E-694C-4742-9597-E2DFBD78CE99", "versionEndIncluding": "1.0.3" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "941141AF-7E4A-4302-82A0-410D5694983A" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6B24564-AA45-4A26-BB3D-8C9B8DF8EBD2" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0882F9F6-0C78-472E-82B2-0DCD3909EBAF" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69F3FB66-F6C8-449C-9650-B0D906E307AA" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F6E633C-EFF2-45E0-A406-9E44CA31B346", "versionEndIncluding": "1.8.8" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB7DC2DA-216C-4A82-92AF-13F6AAA40BA0" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB74C024-F874-497B-9639-0B445F4E2E45" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4A71A24-1102-4959-ADBD-2847A58F396F" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3A7D423-B883-4533-B1E6-F8A9DE6CD7F5" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5E6C436-3EA7-43AF-B3A2-18CF85D19C83" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A7A83AA-16D8-4B8F-8E97-BAA4C1391180" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D315C62C-C17B-4D0B-A899-B9A6C7E625C0" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B8A2C7F-16C7-48D0-AE1B-4888D7AFCEF1" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18C4F4DD-08B3-4B0D-BBD7-4192194BD305" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "154BA32F-A747-4C84-8E8B-6D0D41310754" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E08851A2-465E-43EC-B28B-2A740207ABC7" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6977AFED-2DA4-43C0-8721-9A2F3D16B353" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D00AA688-C5CE-4664-AF62-9ADB9BC0BF52" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98934B23-304B-4B8E-B55E-71A711F066AA" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76B0B4EC-CD60-4042-B23A-0AAF9969AD6E" }, { "criteria": "cpe:2.3:a:redhat:icedtea6:1.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD3F4CAF-63D5-44DF-B4ED-71C3CF49F91C" } ], "operator": "OR" } ] } ]