Thread-topic: [SA22218] Opera Web Browser URL Handling Buffer Overflow Vulnerability
> ----------------------------------------------------------------------
>
> TITLE:
> Opera Web Browser URL Handling Buffer Overflow Vulnerability
>
> SECUNIA ADVISORY ID:
> SA22218
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/22218/
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> SOFTWARE:
> Opera 9.x
> http://secunia.com/product/10615/
>
> DESCRIPTION:
> A vulnerability has been reported in Opera Web Browser, which can be
> exploited by malicious people to compromise a user's system.
>
> The vulnerability is caused due to a boundary error when processing
> overly long URLs. This can be exploited to cause a heap-based buffer
> overflow by passing an overly long URL (more than 256 bytes) in a
> tag.
>
> Successful exploitation allows execution of arbitrary code when a
> user visits a malicious website.
>
> The vulnerability is reported in versions 9.0 and 9.01 on Windows and
> Linux. Version 8.x is reportedly not affected.
>
> SOLUTION:
> Update to version 9.02.
>
> PROVIDED AND/OR DISCOVERED BY:
> Discovered by an anonymous person and reported via iDefense Labs.
>
> ORIGINAL ADVISORY:
> Opera Software:
> http://www.opera.com/support/search/supsearch.dml?index=848
>
> iDefense Labs:
> http://labs.idefense.com/intelligence/vulnerabilities/display.
> php?id=424
>