CVE-2003-1387

Buffer overflow in Opera 6.05 and 6.06, and possibly other versions, allows remote attackers to execute arbitrary code via a URL with a long username.
References
Link Resource
http://securityreason.com/securityalert/3253 Broken Link
http://www.securityfocus.com/archive/1/311194 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/315794 Broken Link Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/6811 Broken Link Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 Third Party Advisory VDB Entry
http://securityreason.com/securityalert/3253 Broken Link
http://www.securityfocus.com/archive/1/311194 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/315794 Broken Link Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/6811 Broken Link Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () http://securityreason.com/securityalert/3253 - Broken Link () http://securityreason.com/securityalert/3253 - Broken Link
References () http://www.securityfocus.com/archive/1/311194 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/311194 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/315794 - Broken Link, Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/315794 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/6811 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/6811 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 - Third Party Advisory, VDB Entry

01 Mar 2022, 20:15

Type Values Removed Values Added
References (SREASON) http://securityreason.com/securityalert/3253 - (SREASON) http://securityreason.com/securityalert/3253 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 - Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/315794 - Exploit (BUGTRAQ) http://www.securityfocus.com/archive/1/315794 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/311194 - (BUGTRAQ) http://www.securityfocus.com/archive/1/311194 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/6811 - Patch (BID) http://www.securityfocus.com/bid/6811 - Broken Link, Patch, Third Party Advisory, VDB Entry
CWE CWE-119 CWE-120
CPE cpe:2.3:a:opera_software:opera_web_browser:6.0.6:*:win32:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0_beta2:*:win32:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:6.0.5:*:win32:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0_beta1:*:win32:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2003-1387

Mitre link : CVE-2003-1387

CVE.ORG link : CVE-2003-1387


JSON object : View

Products Affected

opera

  • opera_browser
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')