From 0e1765d248a0c3d55363b2c7e7d9bb8562271adf Mon Sep 17 00:00:00 2001 From: "Simon L. B. Nielsen" Date: Wed, 30 Nov 2005 20:55:36 +0000 Subject: Document opera -- multiple vulnerabilities. --- security/vuxml/vuln.xml | 50 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 60f66c1777d6..c57264f01aa5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,56 @@ Note: Please add new entries to the beginning of this file. --> + + opera -- multiple vulnerabilities + + + linux-opera + opera-devel + opera + 8.51 + + + + +

Opera reports:

+
+

It is possible to make a form input that looks like an + image link. If the form input has a "title" attribute, the + status bar will show the "title". A "title" which looks + like a URL can mislead the user, since the title can say + http://nice.familiar.com/, while the form action can be + something else.

+

Opera's tooltip says "Title:" before the title text, + making a spoof URL less convincing. A user who has enabled + the status bar and disabled tooltips can be affected by + this. Neither of these settings are Opera's defaults.

+

This exploit is mostly of interest to users who disable + JavaScript. If JavaScript is enabled, any link target or + form action can be overridden by the script. The tooltip + and the statusbar can only be trusted to show the true + location if JavaScript is disabled.

+
+
+

Java code using LiveConnect methods to remove a property + of a JavaScript object may in some cases use null pointers + that can make Opera crash. This crash is not exploitable + and such code is rare on the web.

+
+ +
+ + CVE-2005-3699 + http://secunia.com/advisories/17571/ + http://www.opera.com/support/search/supsearch.dml?index=817 + http://www.opera.com/support/search/supsearch.dml?index=819 + + + 2005-11-16 + 2005-11-30 + +
+ opera -- command line URL shell command injection -- cgit v1.2.3