Opera < 10.61 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 800844

Synopsis

The remote host has a web browser that is vulnerable to multiple attack vectors.

Description

The remote host is running the Opera web browser.

Versions of Opera earlier than 10.61 are potentially affected by multiple vulnerabilities :

- A heap overflow when performing painting operations on an HTML5 canvas can result in execution of arbitrary code, (KB 966)

- An issue with tab focus is open to an attack where it is used to obscure a download dialog that is in another tab. The user can be tricked into clicking buttons in the dialog, resulting in the downloaded file being executed. (KB 967)

- Certain types of content concerning the news feed preview do not have their scripts removed properly, possibly resulting in subscription of feeds without the user's consent. (KB 968)

Loading an animated PNG image may cause high CPU usage with no response from the browser. (CVE-2010-3021)

A memory corruption issue exists when handling an html page with a very large SIZE parameter in the SELECT tag. (CVE-2011-1824)

Solution

Upgrade to Opera 10.61 or later.

See Also

http://.opera.com/docs/changelogs/windows/1061

http://.opera.com/support/kb/view/966

http://.opera.com/support/kb/view/967

http://.opera.com/support/kb/view/968

secunia.com/secunia_research/2010-110

http://.toucan-system.com/advisories/tssa-2011-02.txt

Plugin Details

Severity: High

ID: 800844

Family: Web Clients

Published: 8/12/2010

Nessus ID: 48317

Vulnerability Information

Patch Publication Date: 8/12/2010

Vulnerability Publication Date: 8/12/2010

Reference Information

CVE: CVE-2010-2576, CVE-2010-3019, CVE-2010-3020, CVE-2010-3021, CVE-2011-1824

BID: 42407, 47764