Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 294680 - <www-client/opera-10.0 Multiple vulnerabilities (CVE-2009-{2059,2067,2070,3013})
Summary: <www-client/opera-10.0 Multiple vulnerabilities (CVE-2009-{2059,2067,2070,3013})
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-11-26 08:32 UTC by Alex Legler (RETIRED)
Modified: 2012-06-15 17:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-26 08:32:58 UTC
CVE-2009-2059 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059):
  Opera, possibly before 9.25, uses the HTTP Host header to determine
  the context of a document provided in a (1) 4xx or (2) 5xx CONNECT
  response from a proxy server, which allows man-in-the-middle
  attackers to execute arbitrary web script by modifying this CONNECT
  response, aka an "SSL tampering" attack.
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-26 08:33:48 UTC
This seems to be fixed, let's send it with the next Opera GLSA.
Comment 2 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-26 08:36:19 UTC
CVE-2009-2067 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067):
  Opera detects http content in https web pages only when the top-level
  frame uses https, which allows man-in-the-middle attackers to execute
  arbitrary web script, in an https site's context, by modifying an
  http page to include an https iframe that references a script file on
  an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL)
  pages."

CVE-2009-2070 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070):
  Opera displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT
  response page returned by a proxy server, which allows
  man-in-the-middle attackers to spoof an arbitrary https site by
  letting a browser obtain a valid certificate from this site during
  one request, and then sending the browser a crafted 502 response page
  upon a subsequent request.

Comment 3 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-11-26 08:36:43 UTC
These two as well.
Comment 4 Stefan Behte (RETIRED) gentoo-dev Security 2010-03-06 15:00:38 UTC
CVE-2009-3013 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013):
  Opera 9.52 and earlier, and 10.00 Beta 3 Build 1699, does not
  properly block data: URIs in Location headers in HTTP responses,
  which allows remote attackers to conduct cross-site scripting (XSS)
  attacks via vectors related to (1) injecting a Location header that
  contains JavaScript sequences in a data:text/html URI or (2) entering
  a data:text/html URI with JavaScript sequences when specifying the
  content of a Location header.  NOTE: the JavaScript executes outside
  of the context of the HTTP site.

Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2012-06-15 17:40:24 UTC
This issue was resolved and addressed in
 GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml
by GLSA coordinator Sean Amoss (ackle).