header-logo
Suggest Exploit
vendor:
Opera Web Browser
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overrun
120
CWE
Product Name: Opera Web Browser
Affected Version From: 6
Affected Version To: 7
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows
2002

Buffer Overrun Vulnerability in Opera Web Browser

A buffer overrun vulnerability has been discovered in the Opera web browser. The issue affects Opera versions 6 and 7 on the Microsoft Windows platform. Due to insufficient bounds checking when copying file names to a temporary buffer it may be possible for an attacker to corrupt memory. The problem occurs when downloading a file with a name of excessive length. Successful exploitation of this issue may allow an attacker to execute arbitrary commands within a browser that downloads the malicious file.

Mitigation:

Ensure that all files downloaded are from trusted sources and that the file names are of reasonable length.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7056/info

A buffer overrun vulnerability has been discovered in the Opera web browser. The issue affects Opera versions 6 and 7 on the Microsoft Windows platform.

Due to insufficient bounds checking when copying file names to a temporary buffer it may be possible for an attacker to corrupt memory. The problem occurs when downloading a file with a name of excessive length.

Successful exploitation of this issue may allow an attacker to execute arbitrary commands within a browser that downloads the malicious file.

It should be noted that this issue is limited to files that are displayed in the 'Download Dialog'.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22341.tgz