Lucene search

K
saintSAINT CorporationSAINT:7BA284695A3EAA34108F9FE8A5E97F15
HistoryJan 13, 2009 - 12:00 a.m.

Opera file URI buffer overflow

2009-01-1300:00:00
SAINT Corporation
my.saintcorporation.com
17

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.473 Medium

EPSS

Percentile

97.5%

Added: 01/13/2009
CVE: CVE-2008-5178
BID: 32323
OSVDB: 49882

Background

Opera is a web browser which is available for multiple platforms.

Problem

A buffer overflow vulnerability allows command execution when a user opens a long, specially crafted file:// URI.

Resolution

Upgrade to Opera 9.63 or higher.

References

<http://secunia.com/advisories/34294&gt;

Limitations

Exploit works on Opera 9.62 and requires a user to load the exploit page in Opera.

Due to the nature of the vulnerability, the success of the exploit may depend on the target’s memory state.

Platforms

Windows XP

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.473 Medium

EPSS

Percentile

97.5%