[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-4197Date: (C)2008-09-27   (M)2024-02-23


Opera before 9.52 on Windows, Linux, FreeBSD, and Solaris, when processing custom shortcut and menu commands, can produce argument strings that contain uninitialized memory, which might allow user-assisted remote attackers to execute arbitrary code or conduct other attacks via vectors related to activation of a shortcut.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score : 9.3
Exploit Score: 2.8Exploit Score: 8.6
Impact Score: 5.9Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
SECTRACK-1020720
BID-30768
SECUNIA-31549
SECUNIA-32538
ADV-2008-2416
GLSA-200811-01
http://www.openwall.com/lists/oss-security/2008/09/19/2
http://www.openwall.com/lists/oss-security/2008/09/24/4
http://bugs.gentoo.org/show_bug.cgi?id=235298
http://www.opera.com/docs/changelogs/freebsd/952/
http://www.opera.com/docs/changelogs/linux/952/
http://www.opera.com/docs/changelogs/solaris/952/
http://www.opera.com/docs/changelogs/windows/952/
http://www.opera.com/support/search/view/894/
opera-shortcuts-code-execution(44552)

OVAL    1
oval:org.secpod.oval:def:35835

© SecPod Technologies