GLSA 200502-17: Opera: Multiple vulnerabilities
Severity: | normal |
Title: | Opera: Multiple vulnerabilities |
Date: | 02/14/2005 |
Bugs: |
|
ID: | 200502-17 |
Synopsis
Opera is vulnerable to several vulnerabilities which could result in information disclosure and facilitate execution of arbitrary code.Background
Opera is a multi-platform web browser.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
www-client/opera | < 7.54-r3 | >= 7.54-r3 | All supported architectures |
Description
Opera contains several vulnerabilities:
- fails to properly validate Content-Type and filename.
- fails to properly validate date: URIs.
- uses kfmclient exec as the Default Application to handle downloaded files when integrated with KDE.
- fails to properly control frames.
- uses Sun Java packages insecurely.
- searches an insecure path for plugins.
Impact
An attacker could exploit these vulnerabilities to:
- execute arbitrary code.
- load a malicious frame in the context of another browser session.
- leak information.
Workaround
There is no known workaround at this time.
Resolution
All Opera users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/opera-7.54-r3"
References
Opera Changelog for 7.54u1 Opera Changelog for 7.54u2 CVE-2004-1157 CVE-2004-1489 CVE-2004-1490 CVE-2004-1491 CVE-2005-0456 CVE-2005-0457
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.