Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 96683 - www-client/opera Dialog Origin Spoofing Vulnerability
Summary: www-client/opera Dialog Origin Spoofing Vulnerability
Status: RESOLVED DUPLICATE of bug 96273
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Other
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/15488/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-06-21 03:46 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2005-06-21 13:30 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-06-21 03:46:06 UTC
Secunia Research has discovered a vulnerability in Opera, which can be exploited by malicious web sites to spoof dialog boxes.
 
 The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open e.g. a prompt dialog box, which appears to be from a trusted site.
 
 Successful exploitation normally requires that a user is tricked into opening a link from a malicious web site to a trusted web site.
 
 Secunia has constructed a test, which can be used to check if your browser is affected by this issue:
 http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/
 
 The vulnerability has been confirmed in version 8.0. Prior versions may also be affected.

Solution:
Update to version 8.01.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-06-21 13:30:45 UTC
Added to the 8.01 fixlist

*** This bug has been marked as a duplicate of 96273 ***