Vulnerability Name: | CVE-2008-5178 (CCN-46653) | ||||||||
Assigned: | 2008-11-17 | ||||||||
Published: | 2008-11-17 | ||||||||
Updated: | 2017-10-19 | ||||||||
Summary: | Heap-based buffer overflow in Opera 9.62 on Windows allows remote attackers to execute arbitrary code via a long file:// URI. Note: this might overlap CVE-2008-5680. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20081117 Opera 9.6x file:// overflow Source: CCN Type: BugTraq Mailing List, Mon Nov 17 2008 - 12:16:22 CST Opera 9.6x file:// overflow Source: MITRE Type: CNA CVE-2008-5178 Source: OSVDB Type: UNKNOWN 49882 Source: CCN Type: SA32752 Opera "file://" URI Handling Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 32752 Source: SECUNIA Type: UNKNOWN 34294 Source: GENTOO Type: UNKNOWN GLSA-200903-30 Source: CCN Type: GLSA-200903-30 Opera: Multiple vulnerabilities Source: CCN Type: Opera Web site Opera Web Browser Source: CONFIRM Type: UNKNOWN http://www.opera.com/support/kb/view/922/ Source: CCN Type: OSVDB ID: 49882 Opera on Windows file:// URI Handling Overflow Source: CCN Type: OSVDB ID: 50952 Opera Crafted Text Area Handling Remote Overflow Source: BID Type: Exploit 32323 Source: CCN Type: BID-32323 Opera Web Browser 'file://' Heap Based Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2008-3183 Source: XF Type: UNKNOWN opera-filehandler-bo(46653) Source: XF Type: UNKNOWN opera-filehandler-bo(46653) Source: EXPLOIT-DB Type: UNKNOWN 7135 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |