Check Point Advisories

Update Protection against Opera Browser Content Length Buffer Overflow

Check Point Reference: CPAI-2010-133
Date Published: 14 May 2010
Severity: High
Last Updated: Friday 01 January, 2010
Source: Secunia Advisory: SA38820
Protection Provided by:
Who is Vulnerable? Opera Browser 10.x
Vulnerability Description A buffer overflow vulnerability exists in Opera Browser, a Web browser and Internet suite developed by the Opera Software company. The vulnerability is due to a boundary error in the way the browser processes HTTP server replies. Remote attackers could exploit this vulnerability by persuading a target user to connect to an attacker-controlled HTTP server with a vulnerable version of Opera.
Update/Patch AvaliableThe vendor has not released a patch to address this vulnerability.
Vulnerability DetailsA buffer overflow vulnerability exists in Opera. Specifically, the HTTP Content-Length header is incorrectly handled. Remote attackers could exploit this vulnerability by convincing a target user to connect to a malicious HTTP server. Successful exploitation would cause buffer overflow that could allow the attacker to execute arbitrary code.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK