CVE-2011-3377
Published Feb 5, 2014
Last updated 6 years ago
Overview
- Description
- The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same second-level domain, but a different sub-domain than the targeted domain.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "941141AF-7E4A-4302-82A0-410D5694983A" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6B24564-AA45-4A26-BB3D-8C9B8DF8EBD2" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0882F9F6-0C78-472E-82B2-0DCD3909EBAF" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD2BD3A8-D9E9-46E7-AEC9-B5511A10C472" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D8C118E-EF65-448B-940F-9892C59013DC" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "042B0E43-92C9-42F3-B6F3-7AE3F044FB5E" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69F3FB66-F6C8-449C-9650-B0D906E307AA" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDD91C17-3187-4150-A77A-A012D2A74AA8" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08431724-45B6-48A3-BEA4-94F9BC27B5EB" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D798F99B-D6C3-48B8-B186-C4B2B542D246" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5" } ], "operator": "OR" } ] } ]