- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200701-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Opera: Two remote code execution vulnerabilities
      Date: January 12, 2007
      Bugs: #160369
        ID: 200701-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
Two vulnerabilities may allow the execution of arbitrary code.

Background
=========
Opera is a multi-platform web browser.

Affected packages
================
    -------------------------------------------------------------------
     Package           /  Vulnerable  /                     Unaffected
    -------------------------------------------------------------------
  1  www-client/opera       < 9.10                             >= 9.10

Description
==========
Christoph Deal discovered that JPEG files with a specially crafted DHT
marker can be exploited to cause a heap overflow. Furthermore, an
anonymous person discovered that Opera does not correctly handle
objects passed to the "createSVGTransformFromMatrix()" function.

Impact
=====
An attacker could potentially exploit the vulnerabilities to execute
arbitrary code with the privileges of the user running Opera by
enticing a victim to open a specially crafted JPEG file or a website
containing malicious JavaScript code.

Workaround
=========
The vendor recommends disabling JavaScript to avoid the
"createSVGTransformFromMatrix" vulnerability. There is no known
workaround for the other vulnerability.

Resolution
=========
All Opera users should update to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-client/opera-9.10"

References
=========
  [ 1 ] Opera Advisory (createSVGTransformFromMatrix)
        https://www.opera.com:443/help
  [ 2 ] Opera Advisory (JPEG)
        https://www.opera.com:443/help
  [ 3 ] CVE-2007-0126
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0126
  [ 4 ] CVE-2007-0127
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0127

Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  https://security.gentoo.org/glsa/200701-08

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org/.

License
======
Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5/

Gentoo: GLSA-200701-08: Opera: Two remote code execution vulnerabilities

Two vulnerabilities may allow the execution of arbitrary code.

Summary

Gentoo Linux Security Advisory GLSA 200701-08 https://security.gentoo.org/ Severity: Normal Title: Opera: Two remote code execution vulnerabilities Date: January 12, 2007 Bugs: #160369 ID: 200701-08

Synopsis ======= Two vulnerabilities may allow the execution of arbitrary code.
Background ========= Opera is a multi-platform web browser.
Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/opera < 9.10 >= 9.10
========== Christoph Deal discovered that JPEG files with a specially crafted DHT marker can be exploited to cause a heap overflow. Furthermore, an anonymous person discovered that Opera does not correctly handle objects passed to the...

Read the Full Advisory

Resolution

References


Availability

Concerns

Severity

Synopsis

Background

Affected Packages

Impact

Workaround

Related News