Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200606-01 ] Opera: Buffer overflow
Date: Wed, 07 Jun 2006 05:42:46
Message-Id: 200606070720.47749.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200606-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Opera: Buffer overflow
9 Date: June 07, 2006
10 Bugs: #129800
11 ID: 200606-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Opera contains an integer signedness error resulting in a buffer
19 overflow which may allow a remote attacker to execute arbitrary code.
20
21 Background
22 ==========
23
24 Opera is a multi-platform web browser.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-client/opera < 8.54 >= 8.54
33
34 Description
35 ===========
36
37 SEC Consult has discovered a buffer overflow in the code processing
38 style sheet attributes. It is caused by an integer signedness error in
39 a length check followed by a call to a string function. It seems to be
40 hard to exploit this buffer overflow to execute arbitrary code because
41 of the very large amount memory that has to be copied.
42
43 Impact
44 ======
45
46 A remote attacker can entice a user to visit a web page containing a
47 specially crafted style sheet attribute that will crash the user's
48 browser and maybe lead to the execution of arbitrary code.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All Opera users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=www-client/opera-8.54"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2006-1834
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1834
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200606-01.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2006 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5