Buffer overflow in the transfer manager in Opera before 9.21 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted torrent file. NOTE: due to the lack of details, it is not clear if this is the same issue as CVE-2007-2274.
References
Link | Resource |
---|---|
http://isc.sans.org/diary.html?storyid=2823 | Patch Third Party Advisory |
http://osvdb.org/36229 | Broken Link |
http://secunia.com/advisories/25278 | Broken Link Patch |
http://securitytracker.com/id?1018089 | Broken Link Third Party Advisory VDB Entry |
http://www.opera.com/support/search/view/860/ | Broken Link |
http://www.securityfocus.com/bid/24080 | Broken Link Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2007/1888 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 | Third Party Advisory VDB Entry |
Configurations
History
26 Feb 2022, 04:01
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
References | (OSVDB) http://osvdb.org/36229 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/25278 - Broken Link, Patch | |
References | (MISC) http://isc.sans.org/diary.html?storyid=2823 - Patch, Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://www.opera.com/support/search/view/860/ - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/24080 - Broken Link, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2007/1888 - Broken Link | |
References | (SECTRACK) http://securitytracker.com/id?1018089 - Broken Link, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:opera_software:opera_web_browser:8.0_final_build_1095:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0_beta1:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.02:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.51:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.20:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.23:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.20_beta1_build2981:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.53_build_3850:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.11:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.21:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.22:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.10:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.50b1:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:9:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0_beta2:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.0_beta_3:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.50:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8_beta_3:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.0_beta_2:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.51:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.11b:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.01:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.0:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.52:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:9.01:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:9.02:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.53:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.0_beta_1:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:9.10:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.50:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.53:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:9.20:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.11j:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:8.52:*:*:*:*:*:*:* |
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* |
Information
Published : 2007-05-22 19:30
Updated : 2024-02-04 17:13
NVD link : CVE-2007-2809
Mitre link : CVE-2007-2809
CVE.ORG link : CVE-2007-2809
JSON object : View
Products Affected
opera
- opera_browser
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')