CVE-2013-6493
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
03/03/2014
Last modified:
12/04/2025
Description
The LiveConnect implementation in plugin/icedteanp/IcedTeaNPPlugin.cc in IcedTea-Web before 1.4.2 allows local users to read the messages between a Java applet and a web browser by pre-creating a temporary socket file with a predictable name in /tmp.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:* | 1.3.2 (including) | |
cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://icedtea.classpath.org/hg/icedtea-web/rev/228e3652214a
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00089.html
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2014-February/026192.html
- http://seclists.org/oss-sec/2014/q1/282
- http://secunia.com/advisories/57036
- http://www.ubuntu.com/usn/USN-2131-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1010958
- http://icedtea.classpath.org/hg/icedtea-web/rev/228e3652214a
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00089.html
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2014-February/026192.html
- http://seclists.org/oss-sec/2014/q1/282
- http://secunia.com/advisories/57036
- http://www.ubuntu.com/usn/USN-2131-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1010958