Update Protection against Opera Browser Document Writing Uninitialized Memory Access
|Check Point Reference:||CPAI-2011-100|
|Source:||Secunia Advisory SA39590|
|Protection Provided by:||
Who is Vulnerable?
Opera Software Opera 10.52 and prior
A ulnerability was reported in Opera web browser, a web browser and Internet suite developed by the Opera Software company. The vulnerability is due to an error while handling asynchronous modifications to an HTML document. A remote attacker can exploit this issue by convincing a target user to open a specifically crafted web page.
Opera Software has released an advisory addressing this vulnerability.
The vulnerability is caused due to an error when continuously modifying document content on a web page. If successful. a remote attacker may execute remote code on the target system.
The protection will detect and block the transfer of HTML documents with multiple modifications to the DOM tree inside timer handlers.
To configure the defense, select your product from the list below and follow the related protection steps.
IPS-1 & IPS-1 NGX R65
How Can I Protect My Network?
1. In the IPS-1 Policy Manager, click on the Protection tab.
2. In the Protection tree, click Web Intelligence > HTML, and select the Opera protection group.
3. Click Opera Browser Document Writing Uninitialized Memory Access (IPS-1 NGX R65 only).
4. In the configuration pane, under Settings, check Active.
5. Click on Install Policy.
How Do I Know if My Network is Under Attack?
Upon attack, the following entries will be logged:
Alert Name: Opera Vulnerabilities
Description: Opera Browser Document Writing Uninitialized Memory Access