FreeBSD : opera -- execution of arbitrary code (0925716f-34e2-11e2-aa75-003067c2616f)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Opera reports :

When requesting pages using HTTP, Opera temporarily stores the
response in a buffer. In some cases, Opera may incorrectly allocate
too little space for a buffer, and may then store too much of the
response in that buffer. This causes a buffer overflow, which in turn
can lead to a memory corruption and crash. It is possible to use this
crash to execute the overflowing data as code, which may be controlled
by an attacking site.

See also :

http://www.opera.com/support/kb/view/1036/
http://www.nessus.org/u?351f1b16

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 63015 ()

Bugtraq ID:

CVE ID: