Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Opera Multiple Vulnerabilities

-

Release Date:  2012-12-05    Last Update:  2013-01-17    Views:  6,934

Secunia Advisory SA51462

Where:

From remote

Impact:

Spoofing, Privilege escalation, System access

Solution Status:

Vendor Patch

Software:

CVE Reference(s):

Description


A security issue and two vulnerabilities have been reported in Opera, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct spoofing attacks and potentially compromise a user's system.

1) An error when decoding image data can be exploited to cause a heap-based buffer underflow via a specially crafted GIF image.

Successful exploitation of this vulnerability may allow execution of arbitrary code.

2) An error when loading a site can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar when a user follows a specially crafted link.

3) The security issue is caused due to the application setting insecure file system permissions on the profile folder, which can be exploited to overwrite the files and execute certain commands.

This security issue affects Opera for Linux/Unix only.

The security issue and the vulnerabilities are reported in versions prior to 12.12.


Solution:
Update to version 12.12.

Provided and/or discovered by:
1) Kaveh Ghaemmaghami
2) The vendor credits Masato Kinugawa
3) The vendor credits Jann Horn

Original Advisory:
Opera:
http://www.opera.com/docs/changelogs/unified/1212/

Kaveh Ghaemmaghami:
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0055.html

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Opera Multiple Vulnerabilities

User Message
shinnai RE: Opera GIF Image Handling Buffer Underflow Vulnerability
Member 7th Dec, 2012 15:02
Score: 7
Posts: 4
User Since: 11th Jan 2008
System Score: N/A
Location: IT
Last edited on 7th Dec, 2012 15:02
Uhm, I suppose someone in Neohapsis\Secunia has checked this bug (and\or the reputation of Kaveh Ghaemmagham, isn't it?) so could you tell me how you do you control esi? Uhm, I'm wrong so I'll wait for a Metasploit module which take advantage of this vulnerability, see you soon...
Was this reply relevant?
+0
-0
happywalrus RE: Opera GIF Image Handling Buffer Underflow Vulnerability
Member 18th Dec, 2012 13:11
Score: 0
Posts: 6
User Since: 18th Dec 2012
System Score: N/A
Location: RU
Last edited on 18th Dec, 2012 13:11
Fixed in 12.12: http://www.opera.com/support/kb/view/1038/
Was this reply relevant?
+0
-0
happywalrus RE: Opera GIF Image Handling Buffer Underflow Vulnerability
Member 18th Dec, 2012 15:02
Score: 0
Posts: 6
User Since: 18th Dec 2012
System Score: N/A
Location: RU
Last edited on 18th Dec, 2012 15:02
Maybe it's also reasonable to include in this advisory the other two vulnerabilites fixed in this version?
http://www.opera.com/support/kb/view/1039/ - http://www.opera.com/support/kb/view/1040/
Was this reply relevant?
+0
-0

happywalrus

delete comment
[+]
This reply has been deleted

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability