Buffer overflow in Opera 6.05 and 6.06, and possibly other versions, allows remote attackers to execute arbitrary code via a URL with a long username.
References
Link | Resource |
---|---|
http://securityreason.com/securityalert/3253 | Broken Link |
http://www.securityfocus.com/archive/1/311194 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/315794 | Broken Link Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/6811 | Broken Link Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 | Third Party Advisory VDB Entry |
http://securityreason.com/securityalert/3253 | Broken Link |
http://www.securityfocus.com/archive/1/311194 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/315794 | Broken Link Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/6811 | Broken Link Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3253 - Broken Link | |
References | () http://www.securityfocus.com/archive/1/311194 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/315794 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/6811 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 - Third Party Advisory, VDB Entry |
01 Mar 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | (SREASON) http://securityreason.com/securityalert/3253 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 - Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/315794 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/311194 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/6811 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
CWE | CWE-120 | |
CPE | cpe:2.3:a:opera_software:opera_web_browser:7.0_beta2:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:6.0.5:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0_beta1:*:win32:*:*:*:*:* |
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:* cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:* cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:* cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:* cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:* |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:47
NVD link : CVE-2003-1387
Mitre link : CVE-2003-1387
CVE.ORG link : CVE-2003-1387
JSON object : View
Products Affected
opera
- opera_browser
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')