CVE-2012-4540
Published Nov 11, 2012
Last updated 6 years ago
Overview
- Description
- Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69F3FB66-F6C8-449C-9650-B0D906E307AA" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDD91C17-3187-4150-A77A-A012D2A74AA8" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08431724-45B6-48A3-BEA4-94F9BC27B5EB" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D798F99B-D6C3-48B8-B186-C4B2B542D246" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B1F9B53-6560-4F57-9E16-552D0C12A4D4" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9C5A2C3-69B0-476E-82AA-A0F86D7D01CA" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B4615F0-3544-433D-9B2B-2FD6A2D602E2" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBB2D9F-F217-43BE-8E92-22B1A2186128" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD5D8436-437C-4ED0-A891-F9614225E1BE" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E71F3808-04EC-41A7-861D-3A8AB9C2AD03" } ], "operator": "OR" } ] } ]