Check Point Reference: | CPAI-2010-133 |
Date Published: | 14 May 2010 |
Severity: | High |
Last Updated: | Friday 01 January, 2010 |
Source: | Secunia Advisory: SA38820 |
Protection Provided by: | |
Who is Vulnerable? | Opera Browser 10.x |
Vulnerability Description | A buffer overflow vulnerability exists in Opera Browser, a Web browser and Internet suite developed by the Opera Software company. The vulnerability is due to a boundary error in the way the browser processes HTTP server replies. Remote attackers could exploit this vulnerability by persuading a target user to connect to an attacker-controlled HTTP server with a vulnerable version of Opera. |
Update/Patch Avaliable | The vendor has not released a patch to address this vulnerability. |
Vulnerability Details | A buffer overflow vulnerability exists in Opera. Specifically, the HTTP Content-Length header is incorrectly handled. Remote attackers could exploit this vulnerability by convincing a target user to connect to a malicious HTTP server. Successful exploitation would cause buffer overflow that could allow the attacker to execute arbitrary code. |