[PCWorks] Opera Multiple Vulnerabilities

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Thu, 21 Aug 2008 06:00:11 -0500

TITLE:
Opera Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA31549

VERIFY ADVISORY:
http://secunia.com/advisories/31549/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Spoofing, Exposure of sensitive information, 
DoS, System access

WHERE:
From remote

SOFTWARE:
Opera 5.x
http://secunia.com/product/82/
Opera 6.x
http://secunia.com/product/81/
Opera 7.x
http://secunia.com/product/761/
Opera 8.x
http://secunia.com/product/4932/
Opera 9.x
http://secunia.com/product/10615/

DESCRIPTION:
Some vulnerabilities have been reported in Opera, which can be
exploited by malicious people to conduct spoofing and 
cross-site
scripting attacks, bypass certain security restrictions, 
disclose
potentially sensitive information, or potentially compromise a 
user's
system.

1) An unspecified error exists when Opera is executed as a 
protocol
handler. This can be exploited to cause a crash and potentially
execute arbitrary code.

NOTE: Reportedly, the vulnerability only affects Opera for 
Windows.

2) The problem is that a web page can change the address of 
frames
from other sites opened inside a pop-up window. This can be 
exploited
to load malicious content into a frame of a trusted website.

3) An unspecified error can be exploited to conduct cross-site
scripting attacks. No further information is currently 
available.

4) An error exists in the processing of custom shortcut and 
menu
commands. This can be exploited to execute applications with
potentially dangerous parameters, created from uninitialized 
memory.

Successful exploitation may allow execution of arbitrary code, 
but
requires that a user is tricked into modifying shortcuts or 
menu
files.

5) An error exists while reporting websites as secure for 
browsing.
This can be exploited to determine the reporting of an insecure
website as secure by including a frame with content from a 
secure
website.

6) An error exists when checking if a web page links to a local 
file.
This can be exploited to link to local feed source files and
potentially determine if a file is present on the local system.

7) An error exists when processing news feed subscription 
requests.
This can be exploited to change the address field to the 
address of
the malicious web page and mislead a user.

The vulnerabilities are reported in versions prior to 9.52.

SOLUTION:
Update to version 9.52.
http://www.opera.com/download/

ORIGINAL ADVISORY:
http://www.opera.com/docs/changelogs/windows/952/

http://www.opera.com/support/search/view/892/
http://www.opera.com/support/search/view/893/
http://www.opera.com/support/search/view/894/
http://www.opera.com/support/search/view/895/
http://www.opera.com/support/search/view/896/
http://www.opera.com/support/search/view/897/


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts: