[Frugalware-security] [ FSA-248 ] opera

vmiklos noreply at frugalware.org
Thu Aug 16 03:02:41 CEST 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frugalware Security Advisory                           FSA-248

Date: 2007-08-16
Package: opera
Vulnerable versions: <= 9.20-1terminus1
Unaffected versions: >= 9.22-1terminus1
Related bugreport: http://bugs.frugalware.org/task/2266
CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3819
			http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3929

Description
===========

1) Robert Swiecki has discovered a vulnerability in Opera, which can be exploited by malicious people to conduct spoofing attacks.
The vulnerability is caused due to an error in the handling of the &quot;data:&quot; URI scheme. This can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar when a user follows a specially crafted link.
2) A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system
The vulnerability is caused due to Opera using already freed memory when parsing BitTorrent headers and can lead to an invalid object pointer being dereferenced. This can be exploited to execute arbitrary code, when the user is tricked into clicking on a specially crafted BitTorrent file and then removes it via a right-click from the download pane.

Updated Packages
================

Check if you have opera installed:

	# pacman-g2 -Q opera

If found, then you should upgrade to the latest version:

	# pacman-g2 -Sy opera

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://ftp.frugalware.org/pub/README.GPG for info

iD8DBQFGw6IxZ7NElSD1VhkRAjFsAKCIQS1fNlXaomzJY15+SAr6hNkleACfQLTE
kE2UR1XEuN9LknVpvWvPY9o=
=mO3L
-----END PGP SIGNATURE-----


More information about the Frugalware-security mailing list