Summary: | <www-client/opera-12.11.1661 : Buffer Overflow and Local File Detection (CVE-2012-{6468,6469}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | jer |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-11-20 13:31:08 UTC
Security - Fixed an issue where HTTP response heap buffer overflow could allow execution of arbitrary code; see our advisory[1] - Fixed an issue where error pages could be used to guess local file paths; see our advisory[2] [1] http://www.opera.com/support/kb/view/1036/ , the same as https://secunia.com/advisories/51331/ [2] http://www.opera.com/support/kb/view/1037/ Arch teams, please test and mark stable: =www-client/opera-12.11.1661 Stable KEYWORDS : amd64 x86 amd64 stable x86 stable Added to existing GLSA request. CVE-2012-6469 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6469): Opera before 12.11 allows remote attackers to determine the existence of arbitrary local files via vectors involving web script in an error page. CVE-2012-6468 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6468): Heap-based buffer overflow in Opera before 12.11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long HTTP response. This issue was resolved and addressed in GLSA 201406-14 at http://security.gentoo.org/glsa/glsa-201406-14.xml by GLSA coordinator Chris Reffett (creffett). This issue was resolved and addressed in GLSA 201406-14 at http://security.gentoo.org/glsa/glsa-201406-14.xml by GLSA coordinator Chris Reffett (creffett). |