Bug 718164 - (CVE-2011-2513) CVE-2011-2513 icedtea, icedtea-web: home directory path disclosure to untrusted applications
CVE-2011-2513 icedtea, icedtea-web: home directory path disclosure to untrust...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20110720,reported=2...
: Security
Depends On: 718180 718181 723556 723557
Blocks: 717859
  Show dependency treegraph
 
Reported: 2011-07-01 04:57 EDT by Tomas Hoger
Modified: 2013-05-21 05:09 EDT (History)
6 users (show)

See Also:
Fixed In Version: icedtea-web 1.0.4, icedtea-web 1.1.1
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-08-08 04:28:34 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2011-07-01 04:57:34 EDT
Omair Majid discovered an information disclosure flaw in the JNLP (Java Network Launching Protocol) implementation used in IcedTea and IcedTea-web. An unsigned Java Web Start application or Java Applet could use this flaw to determine a path to the cache directory (/home/<username>/.netx/cache/) used to store downloaded jars for Web Start application or Applet by querying class's ClassLoader properties. This discloses full path to user's home directory on the local system and user's login name.
Comment 4 Tomas Hoger 2011-07-20 11:02:54 EDT
Created icedtea-web tracking bugs for this issue

Affects: fedora-15 [bug 723556]
Comment 5 Tomas Hoger 2011-07-20 11:02:58 EDT
Created java-1.6.0-openjdk tracking bugs for this issue

Affects: fedora-14 [bug 723557]
Comment 6 errata-xmlrpc 2011-07-27 10:52:45 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:1100 https://rhn.redhat.com/errata/RHSA-2011-1100.html

Note You need to log in before you can comment on or make changes to this bug.