[NEWS] Opera Software Opera Web Browser URL Parsing Heap Overflow
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 18 Oct 2006 11:47:58 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Opera Software Opera Web Browser URL Parsing Heap Overflow
Opera is a "cross-platform web browser". Remote exploitation of a heap
overflow vulnerability within version 9 of Opera Software's Opera Web
browser could allow an attacker to execute arbitrary code on the affected
* Opera versions 9.0 and 9.01
* Opera version 8.0
A flaw exists within Opera when parsing a tag that contains a URL. A heap
buffer with a constant size of 256 bytes is allocated to store the URL,
and the tag's URL is copied into this buffer without sufficient bounds
checking of its length. The vulnerable code would look something like this
char *local_url = malloc(256);
This URL can be inserted into any tag, such as an iframe. The range of
characters that can be used to overflow the buffer is limited.
Opera has addressed this vulnerability with version 9.02 of the Opera Web
Browser. More information can be found in Opera's advisory at
09/15/2006 - Initial vendor notification
09/29/2006 - Initial vendor response
10/17/2006 - Coordinated public disclosure
The information has been provided by
<mailto:idlabs-advisories@xxxxxxxxxxxx> iDefense Labs Security Advisories.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] HTTP Header Injection Vulnerabilities in the Flash Player Plugin
- Next by Date: [NEWS] Apple Xcode WebObjects / OpenBase SQL Multiple Vulnerabilities
- Previous by thread: [NEWS] HTTP Header Injection Vulnerabilities in the Flash Player Plugin
- Next by thread: [NEWS] Apple Xcode WebObjects / OpenBase SQL Multiple Vulnerabilities