Vulnerability Details : CVE-2012-4540
Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-4540
Probability of exploitation activity in the next 30 days: 1.43%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4540
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-4540
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4540
-
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html
IcedTea-Web 1.4.1 released!
-
https://bugzilla.redhat.com/show_bug.cgi?id=1007960
1007960 – (CVE-2013-4349) CVE-2013-4349 icedtea-web: CVE-2012-4540 issue not fixed in 1.4
-
http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html
openSUSE-SU-2012:1524-1: moderate: icedtea-web: update to 1.3.1 (bnc#787
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html
[security-announce] openSUSE-SU-2015:1595-1: important: Security update
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79894
IcedTea-Web Plugin applet buffer overflow CVE-2012-4540 Vulnerability Report
-
http://rhn.redhat.com/errata/RHSA-2012-1434.html
RHSA-2012:1434 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html
openSUSE-SU-2013:1511-1: moderate: update for icedtea-web
-
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html
IcedTea-Web 1.1.7, 1.2.2 and 1.3.1 [security releases] released!
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:171
mandriva.com
-
http://www.securitytracker.com/id?1027738
IcedTea-Web Heap Overflow in IcedTeaScriptableJavaObject Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
https://bugzilla.redhat.com/show_bug.cgi?id=869040
869040 – (CVE-2012-4540) CVE-2012-4540 icedtea-web: IcedTeaScriptableJavaObject::invoke off-by-one heap-based buffer overflow
-
http://www.securityfocus.com/bid/56434
IcedTea-Web CVE-2012-4540 Heap Based Buffer Overflow Vulnerability
-
http://www.debian.org/security/2013/dsa-2768
Debian -- Security Information -- DSA-2768-1 icedtea-web
-
http://www.ubuntu.com/usn/USN-1625-1
USN-1625-1: Icedtea-Web vulnerability | Ubuntu security notices
-
http://www.openwall.com/lists/oss-security/2012/11/07/5
oss-security - IcedTea-Web CVE-2012-4540
-
http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS
release/icedtea-web-1.1: d759ec560073 NEWS
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html
openSUSE-SU-2013:1509-1: moderate: update for icedtea-web
-
http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html
openSUSE-SU-2013:0174-1: moderate: icedtea-web: update to 1.3.1 (bnc#787
-
http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f
release/icedtea-web-1.2: 596a718be03f
-
http://www.securityfocus.com/bid/62426
IcedTea-Web CVE-2013-4349 Heap Based Buffer Overflow Vulnerability
-
http://security.gentoo.org/glsa/glsa-201406-32.xml
IcedTea JDK: Multiple vulnerabilities (GLSA 201406-32) — Gentoo security
-
http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe
release/icedtea-web-1.3: e7970f3da5fe
Products affected by CVE-2012-4540
- cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*