FreeBSD : opera -- execution of arbitrary code (0925716f-34e2-11e2-aa75-003067c2616f)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Opera reports :

When requesting pages using HTTP, Opera temporarily stores the
response in a buffer. In some cases, Opera may incorrectly allocate
too little space for a buffer, and may then store too much of the
response in that buffer. This causes a buffer overflow, which in turn
can lead to a memory corruption and crash. It is possible to use this
crash to execute the overflowing data as code, which may be controlled
by an attacking site.

See also :

Solution :

Update the affected packages.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 63015 ()

Bugtraq ID: