<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for icedtea-web</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1689-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-09-16T08:47:54Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-09-16T08:47:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-09-16T08:47:54Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for icedtea-web</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The Java Plugin IcedTea Web was updated to 1.5.2, fixing bugs and security issues.

* permissions sandbox and signed app and unsigned app with
  permissions all-permissions now run in sandbox instead of not at
  all.
* fixed DownloadService
* RH1231441 Unable to read the text of the buttons of the
  security dialogue
* Fixed RH1233697 icedtea-web: applet origin spoofing
  (CVE-2015-5235, bsc#944208)
* Fixed RH1233667 icedtea-web: unexpected permanent authorization
  of unsigned applets (CVE-2015-5234, bsc#944209)
* MissingALACAdialog made available also for unsigned applications (but ignoring actual manifest value) and fixed
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sledsp4-icedtea-web-12116</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151689-1/</URL>
      <Description>Link for SUSE-SU-2015:1689-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1689-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/944208</URL>
      <Description>SUSE Bug 944208</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/944209</URL>
      <Description>SUSE Bug 944209</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5234/</URL>
      <Description>SUSE CVE CVE-2015-5234 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5235/</URL>
      <Description>SUSE CVE CVE-2015-5235 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4" CPE="cpe:/o:suse:suse_sled:11:sp4">SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="icedtea-web-1.5.3-0.9.1">
      <FullProductName ProductID="icedtea-web-1.5.3-0.9.1">icedtea-web-1.5.3-0.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="icedtea-web-1.5.3-0.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:icedtea-web-1.5.3-0.9.1">icedtea-web-1.5.3-0.9.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.</Note>
    </Notes>
    <CVE>CVE-2015-5234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:icedtea-web-1.5.3-0.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5234.html</URL>
        <Description>CVE-2015-5234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944209</URL>
        <Description>SUSE Bug 944209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.</Note>
    </Notes>
    <CVE>CVE-2015-5235</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:icedtea-web-1.5.3-0.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5235.html</URL>
        <Description>CVE-2015-5235</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944208</URL>
        <Description>SUSE Bug 944208</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
