Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 415379 - <www-client/opera-11.64.1403: buffer overflow in URL constructs (CVE-2012-3561)
Summary: <www-client/opera-11.64.1403: buffer overflow in URL constructs (CVE-2012-3561)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://www.opera.com/support/kb/view/...
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-05-10 14:25 UTC by Jeroen Roovers (RETIRED)
Modified: 2012-06-15 17:41 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jeroen Roovers (RETIRED) gentoo-dev 2012-05-10 14:25:21 UTC
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
 = Advisory: Certain URL constructs can allow arbitrary code execution =
 =  Severity
 =   Critical 
 = Description 

 Certain page address (URL) constructs can cause Opera to allocate the wrong amount of memory for storing the address. When it then attempts to store the address, it will overwrite unrelated memory with attacker-controlled data. This can lead to a crash, which may also execute that data as code.
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~

Arch teams, please test and mark stable:
=www-client/opera-11.64.1403
Target KEYWORDS="amd64 x86"
Comment 1 Maurizio Camisaschi (amd64 AT) 2012-05-10 21:15:14 UTC
amd64 ok
Comment 2 Elijah "Armageddon" El Lazkani (amd64 AT) 2012-05-10 23:07:01 UTC
amd64: pass

can repoman output be fixed/hidden ?
  RDEPEND.badindev
   www-client/opera/opera-11.64.1403.ebuild: ~x86-fbsd(default/bsd/fbsd/x86/8.2) ['sys-apps/util-linux']
Comment 3 Jeff (JD) Horelick (RETIRED) gentoo-dev 2012-05-11 05:43:55 UTC
x86 stable
Comment 4 Agostino Sarubbo gentoo-dev 2012-05-11 07:30:17 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2012-05-11 07:32:22 UTC
@security go ahead with glsa


@jer removed vulnerable version.
Comment 6 Tim Sammut (RETIRED) gentoo-dev 2012-05-11 17:16:27 UTC
Thanks, folks. Added to existing GLSA request.
Comment 7 Jeroen Roovers (RETIRED) gentoo-dev 2012-05-12 14:17:49 UTC
(In reply to comment #5)
> @jer removed vulnerable version.

Er, no, you did that. Please leave that to maintainers next time, and don't lie about it.
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2012-06-15 17:10:11 UTC
CVE-2012-3561 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561):
  Opera before 11.64 does not properly allocate memory for URL strings, which
  allows remote attackers to execute arbitrary code or cause a denial of
  service (memory corruption and application crash) via a crafted string.
Comment 9 GLSAMaker/CVETool Bot gentoo-dev 2012-06-15 17:41:37 UTC
This issue was resolved and addressed in
 GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml
by GLSA coordinator Sean Amoss (ackle).