Ravens PHP Scripts

Opera Multiple Vulnerabilities
Date: Wednesday, December 19, 2007 @ 15:43:43 CET
Topic: Security


SECUNIA ADVISORY ID: SA28169

VERIFY ADVISORY: http://secunia.com/advisories/28169/

CRITICAL: Highly critical

IMPACT: Security Bypass, Exposure of sensitive information, System access

SOFTWARE:
Opera 5.x - http://secunia.com/product/82/
Opera 6.x - http://secunia.com/product/81/
Opera 7.x - http://secunia.com/product/761/
Opera 8.x - http://secunia.com/product/4932/
Opera 9.x - http://secunia.com/product/10615/

DESCRIPTION: Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, and compromise a user's system. The vulnerabilities are reported in versions prior to 9.25.



1) An unspecified error can be exploited via certain plugins to conduct cross-domain scripting attacks.

2) An unspecified error within the processing of TLS certificates can be exploited to execute arbitrary code.

3) An unspecified error within Rich text editing when using designMode can be exploited to conduct cross-domain scripting attacks.

4) An unspecified error within the processing of bitmaps can be exploited to disclose the contents of random memory areas.

SOLUTION: Update to version 9.25. - http://www.opera.com/download/

PROVIDED AND/OR DISCOVERED BY:
1, 3) The vendor credits David Bloom.
2) The vendor credits Alexander Klink, Cynops GmbH.
4) The vendor credits Gynvael Coldwind.

ORIGINAL ADVISORY:
http://www.opera.com/docs/changelogs/windows/925/#security
http://www.opera.com/support/search/view/875/






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=3172