Buffer overflow in the transfer manager in Opera before 9.21 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted torrent file. NOTE: due to the lack of details, it is not clear if this is the same issue as CVE-2007-2274.
References
Configurations
History
21 Nov 2024, 00:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://isc.sans.org/diary.html?storyid=2823 - Patch, Third Party Advisory | |
References | () http://osvdb.org/36229 - Broken Link | |
References | () http://secunia.com/advisories/25278 - Broken Link, Patch | |
References | () http://securitytracker.com/id?1018089 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.opera.com/support/search/view/860/ - Broken Link | |
References | () http://www.securityfocus.com/bid/24080 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2007/1888 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 - Third Party Advisory, VDB Entry |
Information
Published : 2007-05-22 19:30
Updated : 2024-11-21 00:31
NVD link : CVE-2007-2809
Mitre link : CVE-2007-2809
CVE.ORG link : CVE-2007-2809
JSON object : View
Products Affected
opera
- opera_browser
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')