Vulnerability Name: | CVE-2007-5276 (CCN-38335) | ||||||||
Assigned: | 2007-07-24 | ||||||||
Published: | 2007-07-24 | ||||||||
Updated: | 2022-03-01 | ||||||||
Summary: | Opera 9 drops DNS pins based on failed connections to irrelevant TCP ports, which makes it easier for remote attackers to conduct DNS rebinding attacks, as demonstrated by a port 81 URL in an IMG SRC, when the DNS pin had been established for a session on port 80. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
2.1 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-noinfo | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CCN Type: Stanford University DNS-Rebinding Whitepaper Protecting Browsers from DNS Rebinding Attacks Source: MISC Type: Technical Description, Third Party Advisory http://crypto.stanford.edu/dns/dns-rebinding.pdf Source: MITRE Type: CNA CVE-2007-5276 Source: OSVDB Type: Broken Link 45526 Source: CCN Type: Opera Software Web site Opera browser Source: CCN Type: OSVDB ID: 45526 Opera Failed Connection DNS Pin Dropping Rebinding Weakness Source: XF Type: UNKNOWN opera-dns-security-bypass(38335) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |