Opera用户URI警告对话框远程缓冲区溢出漏洞

Opera用户URI警告对话框远程缓冲区溢出漏洞

漏洞ID 1107189 漏洞类型 缓冲区溢出
发布时间 2003-02-10 更新时间 2003-12-31
图片[1]-Opera用户URI警告对话框远程缓冲区溢出漏洞-安全小百科CVE编号 CVE-2003-1387
图片[2]-Opera用户URI警告对话框远程缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200312-073
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/22239
https://cxsecurity.com/issue/WLB-2007100074
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200312-073
|漏洞详情
Opera是一款开放源代码的WEB浏览器。Opera在处理包含用户名的URI时缺少正确边界缓冲区检查,远程攻击者可以利用这个漏洞构建恶意页面,诱使用户点击,使Opera产生缓冲区溢出,可能以Opera权限在系统上执行任意指令。为了安全目的,Opera当用户访问包含用户名的URI时会显示警告对话框,但是Opera对用户名缺少正确的长度检查,超长的用户名可以导致触发缓冲区溢出,攻击者构建的WEB页面,精心设计用户名数据,当诱使用户访问后,可能以用户进程在系统上执行任意指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/6811/info

The Opera browser for Win32 (and possibly other) systems is prone to a remotely exploitable buffer overflow condition. For security purposes, Opera will display a warning any time a user of the client visits a link containing a username as part of the URI. An excessively long username will trigger a buffer overflow condition related to this security feature that may overwrite the stack frame of the affected function. Attackers may exploit this vulnerability to execute instructions on client systems. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22239.tgz
|参考资料

来源:BID
名称:6811
链接:http://www.securityfocus.com/bid/6811
来源:XF
名称:opera-username-url-bo(11281)
链接:http://xforce.iss.net/xforce/xfdb/11281
来源:BUGTRAQ
名称:20030320Opara6.06Released,Security-HoleLeft
链接:http://www.securityfocus.com/archive/1/315794
来源:BUGTRAQ
名称:20030209OperaUsernameBufferOverflowVulnerability
链接:http://www.securityfocus.com/archive/1/311194
来源:SREASON
名称:3253
链接:http://securityreason.com/securityalert/3253
来源:NSFOCUS
名称:4373
链接:http://www.nsfocus.net/vulndb/4373

相关推荐: WinZip Tar Hostile Destination Path Vulnerability

WinZip Tar Hostile Destination Path Vulnerability 漏洞ID 1101166 漏洞类型 Access Validation Error 发布时间 2002-12-17 更新时间 2002-12-17 CVE编号 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享