It was discovered that IcedTea-Web browser plugin incorrectly used the same class loader for applets with the same codebase paths. The default and commonly used codebase value is ".". A malicious applet could use this flaw to gain information about or possibly manipulate other applets currently running in the browser. This could possibly lead to malicious applet's code being executed as part of the other applet.
Acknowledgements: This issue was discovered by Jiri Vanek of the Red Hat OpenJDK Team.
Fixed now in upstream IcedTea-Web versions 1.2.3 and 1.3.2: http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html Upstream commit: http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/25dd7c7ac39c
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0753 https://rhn.redhat.com/errata/RHSA-2013-0753.html