CVE-2013-1927
Published Apr 29, 2013
Last updated 6 years ago
Overview
- Description
- The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Evaluator
- Comment
- -
- Impact
- Per http://www.ubuntu.com/usn/USN-1804-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 Ubuntu 10.04 LTS" Per http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html "Affected Products: openSUSE 12.2"
- Solution
- Per http://www.ubuntu.com/usn/USN-1804-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 Ubuntu 10.04 LTS" Per http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html "Affected Products: openSUSE 12.2"
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7482A659-70CA-48A9-A0B8-53C7347B149A", "versionEndIncluding": "1.2.2" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "941141AF-7E4A-4302-82A0-410D5694983A" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6B24564-AA45-4A26-BB3D-8C9B8DF8EBD2" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0882F9F6-0C78-472E-82B2-0DCD3909EBAF" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD2BD3A8-D9E9-46E7-AEC9-B5511A10C472" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D8C118E-EF65-448B-940F-9892C59013DC" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "042B0E43-92C9-42F3-B6F3-7AE3F044FB5E" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EEB4704-9DA1-4034-B81C-9D1522CE776B" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69F3FB66-F6C8-449C-9650-B0D906E307AA" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDD91C17-3187-4150-A77A-A012D2A74AA8" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08431724-45B6-48A3-BEA4-94F9BC27B5EB" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D798F99B-D6C3-48B8-B186-C4B2B542D246" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B1F9B53-6560-4F57-9E16-552D0C12A4D4" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9C5A2C3-69B0-476E-82AA-A0F86D7D01CA" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B4615F0-3544-433D-9B2B-2FD6A2D602E2" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7378E908-4CE5-43F4-A027-AAF70071638E" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BBB2D9F-F217-43BE-8E92-22B1A2186128" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD5D8436-437C-4ED0-A891-F9614225E1BE" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E71F3808-04EC-41A7-861D-3A8AB9C2AD03" }, { "criteria": "cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "409A056E-75B5-4092-BB84-295AF2637CFE" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8" } ], "operator": "OR" } ] } ]