Advertisement






Opera JPEG Processing Integer Overflow Vulnerability

CVE Category Price Severity
CVE-2009-1589 CWE-190 $1000 High
Author Risk Exploitation Type Date
Unknown High Remote 2006-06-29
CPE
cpe:cpe:/a:opera:opera_browser
CVSS EPSS EPSSP
CVSS:9.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.00792 0.30148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006060137

Below is a copy:

Opera JPEG Processing Integer Overflow Vulnerability (VMSA-20060621-01)

Summary:
An integer overflow vulnerability exists in the Opera Web Browser due to
the improper handling of JPEG files.

Impact:
Remote Code Execution

Affected Versions:
Opera 8.54 and Earlier

Details:
If excessively large height and width values are specified in certain
fields of a JPEG file, an integer overflow may cause Opera to allocate
insufficient memory for the image.  This will lead to a buffer overflow
when the image is loaded into memory, which can be exploited to execute
arbitrary code.

Recommended Actions:
It is recommended that users upgrade to Opera 9.00, which addresses this
vulnerability.  Additionally, users should exercise caution while
accessing the web, and should do so from accounts with limited
privileges.

Timeline:
Reported: 4/25/2006
Fixed: 6/20/2006

Credit:
Chris Ries

References:
Opera Website: http://www.opera.com
VigilantMinds Website: http://www.vigilantminds.com

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum