Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 283391 (CVE-2009-2063) - <www-client/opera-10.00 - multiple vulnerabilities (CVE-2009-{2063,3044,3045,3046,3047,3048,3049})
Summary: <www-client/opera-10.00 - multiple vulnerabilities (CVE-2009-{2063,3044,3045,...
Status: RESOLVED FIXED
Alias: CVE-2009-2063
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.opera.com/docs/changelogs/...
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-09-01 10:45 UTC by Jeroen Roovers (RETIRED)
Modified: 2012-06-15 17:40 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-09-06 09:43:24 UTC
CVE-2009-3044 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044):
  Opera before 10.00 does not properly handle a (1) '\0' character or
  (2) invalid wildcard character in a domain name in the subject's
  Common Name (CN) field of an X.509 certificate, which allows
  man-in-the-middle attackers to spoof arbitrary SSL servers via a
  crafted certificate issued by a legitimate Certification Authority.

CVE-2009-3045 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045):
  Opera before 10.00 trusts root X.509 certificates signed with the MD2
  algorithm, which makes it easier for man-in-the-middle attackers to
  spoof arbitrary SSL servers via a crafted server certificate.

CVE-2009-3046 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046):
  Opera before 10.00 does not check all intermediate X.509 certificates
  for revocation, which makes it easier for remote SSL servers to
  bypass validation of the certificate chain via a revoked certificate.

CVE-2009-3047 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047):
  Opera before 10.00, when a collapsed address bar is used, does not
  properly update the domain name from the previously visited site to
  the currently visited site, which might allow remote attackers to
  spoof URLs.

CVE-2009-3048 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048):
  Opera before 10.00 on Linux, Solaris, and FreeBSD does not properly
  implement the "INPUT TYPE=file" functionality, which allows remote
  attackers to trick a user into uploading an unintended file via
  vectors involving a "dropped file."

CVE-2009-3049 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049):
  Opera before 10.00 does not properly display all characters in
  Internationalized Domain Names (IDN) in the address bar, which allows
  remote attackers to spoof URLs and conduct phishing attacks, related
  to Unicode and Punycode.

Comment 2 Jeroen Roovers (RETIRED) gentoo-dev 2009-09-07 13:59:08 UTC
Dear arch teams, please test and stabilise
=www-client/opera-10.00
 ( amd64,ppc,x86 )
Comment 3 Christian Faulhammer (RETIRED) gentoo-dev 2009-09-08 08:38:03 UTC
x86 stable
Comment 4 Markus Meier gentoo-dev 2009-09-11 19:39:02 UTC
amd64 stable
Comment 5 nixnut (RETIRED) gentoo-dev 2009-09-20 18:57:06 UTC
ppc stable
Comment 6 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-09-22 12:58:57 UTC
CVE-2009-2063 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063):
  Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response
  before a successful SSL handshake, which allows man-in-the-middle
  attackers to execute arbitrary web script, in an https site's
  context, by modifying this CONNECT response to specify a 302 redirect
  to an arbitrary https web site.

Comment 7 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-09-22 13:01:34 UTC
GLSA voting: I'd say YES.
Comment 8 Tobias Heinlein (RETIRED) gentoo-dev 2009-10-20 19:14:25 UTC
YES too, request filed.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2012-06-15 17:40:02 UTC
This issue was resolved and addressed in
 GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml
by GLSA coordinator Sean Amoss (ackle).