SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Opera Vendors:   Opera Software
Opera Bugs Permit Cross-Site Scripting and Denial of Service Attacks
SecurityTracker Alert ID:  1025735
SecurityTracker URL:  http://securitytracker.com/id/1025735
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jun 29 2011
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, Not specified
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 11.50
Description:   Several vulnerabilities were reported in Opera. A remote user can cause denial of service conditions. A remote user can conduct cross-site scripting attacks. The impact of one vulnerability was not disclosed.

The software does not properly enforce security restrictions on data URIs. On certain sites, a remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will run in the security context of the target site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Michal Zalewski of the Google Security Team reported this vulnerability.

A remote user can send specially crafted data to cause the target service to crash.

A remote user can create a large number of invalid URLs to cause the target user's browser to consume all available disk space creating error pages for each invalid URL, causing either the browser or operating system to crash. The files are not removed upon restart, causing the system to remain disabled.

JPCERT reported this vulnerability.

An unspecified flaw exists. The vendor has described the flaw as 'moderately severe'.

Impact:   A remote user can cause excessive disk space consumption on the target user's system.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the target site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The impact of one vulnerability was not disclosed.

Solution:   The vendor has issued a fix (11.50).

The vendor's advisories are available at:

http://www.opera.com/docs/changelogs/unix/1150/
http://www.opera.com/docs/changelogs/mac/1150/
http://www.opera.com/docs/changelogs/windows/1150/
http://www.opera.com/support/kb/view/995/
http://www.opera.com/support/kb/view/996/

Vendor URL:  www.opera.com/docs/changelogs/windows/1150/ (Links to External Site)
Cause:   Access control error, Not specified, Resource error
Underlying OS:  Linux (Any), UNIX (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC