CVE-2007-2809

Buffer overflow in the transfer manager in Opera before 9.21 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted torrent file. NOTE: due to the lack of details, it is not clear if this is the same issue as CVE-2007-2274.
References
Link Resource
http://isc.sans.org/diary.html?storyid=2823 Patch Third Party Advisory
http://osvdb.org/36229 Broken Link
http://secunia.com/advisories/25278 Broken Link Patch
http://securitytracker.com/id?1018089 Broken Link Third Party Advisory VDB Entry
http://www.opera.com/support/search/view/860/ Broken Link
http://www.securityfocus.com/bid/24080 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/1888 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

History

26 Feb 2022, 04:01

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-120
References (OSVDB) http://osvdb.org/36229 - (OSVDB) http://osvdb.org/36229 - Broken Link
References (SECUNIA) http://secunia.com/advisories/25278 - Patch (SECUNIA) http://secunia.com/advisories/25278 - Broken Link, Patch
References (MISC) http://isc.sans.org/diary.html?storyid=2823 - Patch (MISC) http://isc.sans.org/diary.html?storyid=2823 - Patch, Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www.opera.com/support/search/view/860/ - (CONFIRM) http://www.opera.com/support/search/view/860/ - Broken Link
References (BID) http://www.securityfocus.com/bid/24080 - (BID) http://www.securityfocus.com/bid/24080 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2007/1888 - (VUPEN) http://www.vupen.com/english/advisories/2007/1888 - Broken Link
References (SECTRACK) http://securitytracker.com/id?1018089 - (SECTRACK) http://securitytracker.com/id?1018089 - Broken Link, Third Party Advisory, VDB Entry
CPE cpe:2.3:a:opera_software:opera_web_browser:8.54:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.0_final_build_1095:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0_beta1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.02:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.51:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.20:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.23:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.20_beta1_build2981:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.53_build_3850:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.11:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.21:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.22:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.10:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.50b1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:9:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0_beta2:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.0_beta_3:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.50:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8_beta_3:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.0_beta_2:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.51:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.11b:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.01:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.0:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.52:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:9.01:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:9.02:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.53:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.0_beta_1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:9.10:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.50:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.53:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:9.20:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.11j:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:8.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

Information

Published : 2007-05-22 19:30

Updated : 2024-02-04 17:13


NVD link : CVE-2007-2809

Mitre link : CVE-2007-2809

CVE.ORG link : CVE-2007-2809


JSON object : View

Products Affected

opera

  • opera_browser
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')