Search This Blog

Sunday, July 22, 2007

[NT] Opera Software Opera Web Browser BitTorrent Dangling Pointer Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

Opera Software Opera Web Browser BitTorrent Dangling Pointer Vulnerability
------------------------------------------------------------------------


SUMMARY

<http://www.opera.com/> Opera is "a cross-platform web browser". Remote
exploitation of a dangling pointer vulnerability in Opera Software ASA's
Opera web browser could allow an attacker to execute arbitrary code with
the privileges of the logged in user.

DETAILS

Vulnerable Systems:
* Opera version 9.21 on Windows.
* Previous versions may also be affected.

Opera 9.2 supports BitTorrent downloads. When parsing a specially crafted
BitTorrent header, Opera uses memory that has already been freed. This can
result in an invalid object pointer being dereferenced, and may allow for
the execution of arbitrary code. The vulnerability is triggered when the
user right clicks on the transfer and removes it.

Exploitation of this vulnerability allows an attacker to execute arbitrary
code on the affected host with the privileges of the logged in user.

The attacker must persuade a vulnerable user into clicking a link to a
BitTorrent file. The targeted user must subsequently remove the entry from
the download pane. The requirement to remove the torrent is not considered
to be a mitigating factor since it is natural for a user to attempt to do
so when a transfer is not progressing.

Vendor Status:
Version 9.22 of Opera has been released to address this issue.
<http://www.opera.com/support/search/view/862/>

http://www.opera.com/support/search/view/862/

Disclosure Timeline:
* 06/06/2007 - Initial vendor notification
* 06/06/2007 - Initial vendor response
* 07/19/2007 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense.
The original article can be found at:

<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=564>

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=564

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments: