FreeBSD : opera -- execution of arbitrary code (0925716f-34e2-11e2-aa75-003067c2616f)

high Nessus Plugin ID 63015

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Opera reports :

When requesting pages using HTTP, Opera temporarily stores the response in a buffer. In some cases, Opera may incorrectly allocate too little space for a buffer, and may then store too much of the response in that buffer. This causes a buffer overflow, which in turn can lead to a memory corruption and crash. It is possible to use this crash to execute the overflowing data as code, which may be controlled by an attacking site.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?08b6af19

http://www.nessus.org/u?cfd15f61

Plugin Details

Severity: High

ID: 63015

File Name: freebsd_pkg_0925716f34e211e2aa75003067c2616f.nasl

Version: 1.6

Type: local

Published: 11/23/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-opera, p-cpe:/a:freebsd:freebsd:linux-opera-devel, p-cpe:/a:freebsd:freebsd:opera, p-cpe:/a:freebsd:freebsd:opera-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/22/2012

Vulnerability Publication Date: 11/19/2012