Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Browser)  >   Opera Vendors:   Opera Software
Opera Browser Buffer Overflow in Loading URLs May Let Remote Users Execute Code
SecurityTracker Alert ID:  1006513
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 8 2003
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 7.02 Build 2668
Description:   A buffer overflow vulnerability was reported in the Opera web browser in the processing of URLs. A remote user could create a URL that, when loaded by the target user, could cause arbitrary code to be executed on the target user's system with the privileges of the target user.

It is reported that a specially crafted URL can cause the browser to crash, overwritting the EIP register with the file name (converted to unicode). A remote user can thus create a URL to reference certain addresses in memory and potentially execute arbitrary code.

A demonstration exploit URL is provided:

The vendor has reportedly been notified.

Impact:   A remote user can create HTML that, when loaded by the target user, will cause the target user's browser to crash or potentially execute arbitrary code with the privileges of the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  BeOS, Linux (Any), Apple (Legacy "classic" Mac), QNX, UNIX (FreeBSD), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [Full-Disclosure] Unchecked Buffer in Opera 7.02

Tested version : Opera 7.02 Build 2668

Vendor Status : Vendor was contacted on 8-4-2003

Description :

Opera web browser has an unchecked buffer in his code that allow a
malicious website to crash it and in certain circumstances , execute code
with user priviliges .

To reproduce the bug open this link

Opera crashes with an access violation . Instruction pointer EIP is
overwritten by the file name converted to unicode . That makes only
possible to reference certain addresses in memory to execute . To place
your code to execute in a valid address you have to assign it to an
enviroment variable .That place your code in an address that can be
referenced by EIP ( ~00010040 )


Regards ,

David F.Madrid
Madrid , Spain

Full-Disclosure - We believe in it.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC