FreeBSD : opera -- execution of arbitrary code (0925716f-34e2-11e2-aa75-003067c2616f)

High Nessus Plugin ID 63015


The remote FreeBSD host is missing one or more security-related updates.


Opera reports :

When requesting pages using HTTP, Opera temporarily stores the response in a buffer. In some cases, Opera may incorrectly allocate too little space for a buffer, and may then store too much of the response in that buffer. This causes a buffer overflow, which in turn can lead to a memory corruption and crash. It is possible to use this crash to execute the overflowing data as code, which may be controlled by an attacking site.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 63015

File Name: freebsd_pkg_0925716f34e211e2aa75003067c2616f.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2012/11/23

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-opera, p-cpe:/a:freebsd:freebsd:linux-opera-devel, p-cpe:/a:freebsd:freebsd:opera, p-cpe:/a:freebsd:freebsd:opera-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2012/11/22

Vulnerability Publication Date: 2012/11/19