CVE-2008-4197

Opera before 9.52 on Windows, Linux, FreeBSD, and Solaris, when processing custom shortcut and menu commands, can produce argument strings that contain uninitialized memory, which might allow user-assisted remote attackers to execute arbitrary code or conduct other attacks via vectors related to activation of a shortcut.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=235298 Issue Tracking
http://secunia.com/advisories/31549 Broken Link Vendor Advisory
http://secunia.com/advisories/32538 Broken Link Vendor Advisory
http://security.gentoo.org/glsa/glsa-200811-01.xml Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/19/2 Mailing List
http://www.openwall.com/lists/oss-security/2008/09/24/4 Mailing List
http://www.opera.com/docs/changelogs/freebsd/952/ Broken Link
http://www.opera.com/docs/changelogs/linux/952/ Broken Link
http://www.opera.com/docs/changelogs/solaris/952/ Broken Link
http://www.opera.com/docs/changelogs/windows/952/ Broken Link
http://www.opera.com/support/search/view/894/ Broken Link
http://www.securityfocus.com/bid/30768 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020720 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2416 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/44552 Third Party Advisory VDB Entry
http://bugs.gentoo.org/show_bug.cgi?id=235298 Issue Tracking
http://secunia.com/advisories/31549 Broken Link Vendor Advisory
http://secunia.com/advisories/32538 Broken Link Vendor Advisory
http://security.gentoo.org/glsa/glsa-200811-01.xml Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/19/2 Mailing List
http://www.openwall.com/lists/oss-security/2008/09/24/4 Mailing List
http://www.opera.com/docs/changelogs/freebsd/952/ Broken Link
http://www.opera.com/docs/changelogs/linux/952/ Broken Link
http://www.opera.com/docs/changelogs/solaris/952/ Broken Link
http://www.opera.com/docs/changelogs/windows/952/ Broken Link
http://www.opera.com/support/search/view/894/ Broken Link
http://www.securityfocus.com/bid/30768 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020720 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2416 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/44552 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
OR cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*

History

21 Nov 2024, 00:51

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=235298 - Issue Tracking () http://bugs.gentoo.org/show_bug.cgi?id=235298 - Issue Tracking
References () http://secunia.com/advisories/31549 - Broken Link, Vendor Advisory () http://secunia.com/advisories/31549 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/32538 - Broken Link, Vendor Advisory () http://secunia.com/advisories/32538 - Broken Link, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200811-01.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200811-01.xml - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2008/09/19/2 - Mailing List () http://www.openwall.com/lists/oss-security/2008/09/19/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2008/09/24/4 - Mailing List () http://www.openwall.com/lists/oss-security/2008/09/24/4 - Mailing List
References () http://www.opera.com/docs/changelogs/freebsd/952/ - Broken Link () http://www.opera.com/docs/changelogs/freebsd/952/ - Broken Link
References () http://www.opera.com/docs/changelogs/linux/952/ - Broken Link () http://www.opera.com/docs/changelogs/linux/952/ - Broken Link
References () http://www.opera.com/docs/changelogs/solaris/952/ - Broken Link () http://www.opera.com/docs/changelogs/solaris/952/ - Broken Link
References () http://www.opera.com/docs/changelogs/windows/952/ - Broken Link () http://www.opera.com/docs/changelogs/windows/952/ - Broken Link
References () http://www.opera.com/support/search/view/894/ - Broken Link () http://www.opera.com/support/search/view/894/ - Broken Link
References () http://www.securityfocus.com/bid/30768 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/30768 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1020720 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1020720 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/2416 - Broken Link () http://www.vupen.com/english/advisories/2008/2416 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44552 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/44552 - Third Party Advisory, VDB Entry

15 Feb 2024, 20:37

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
References (SECTRACK) http://www.securitytracker.com/id?1020720 - (SECTRACK) http://www.securitytracker.com/id?1020720 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2008/2416 - (VUPEN) http://www.vupen.com/english/advisories/2008/2416 - Broken Link
References (CONFIRM) http://www.opera.com/docs/changelogs/solaris/952/ - (CONFIRM) http://www.opera.com/docs/changelogs/solaris/952/ - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200811-01.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200811-01.xml - Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/44552 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/44552 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www.opera.com/docs/changelogs/linux/952/ - (CONFIRM) http://www.opera.com/docs/changelogs/linux/952/ - Broken Link
References (CONFIRM) http://www.opera.com/docs/changelogs/freebsd/952/ - (CONFIRM) http://www.opera.com/docs/changelogs/freebsd/952/ - Broken Link
References (SECUNIA) http://secunia.com/advisories/32538 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/32538 - Broken Link, Vendor Advisory
References (CONFIRM) http://www.opera.com/docs/changelogs/windows/952/ - (CONFIRM) http://www.opera.com/docs/changelogs/windows/952/ - Broken Link
References (SECUNIA) http://secunia.com/advisories/31549 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/31549 - Broken Link, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2008/09/19/2 - (MLIST) http://www.openwall.com/lists/oss-security/2008/09/19/2 - Mailing List
References (CONFIRM) http://www.opera.com/support/search/view/894/ - (CONFIRM) http://www.opera.com/support/search/view/894/ - Broken Link
References (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=235298 - (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=235298 - Issue Tracking
References (BID) http://www.securityfocus.com/bid/30768 - (BID) http://www.securityfocus.com/bid/30768 - Broken Link, Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2008/09/24/4 - (MLIST) http://www.openwall.com/lists/oss-security/2008/09/24/4 - Mailing List
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 8.8
CWE CWE-399 CWE-908
First Time Oracle solaris
Linux linux Kernel
Oracle

Information

Published : 2008-09-27 10:30

Updated : 2024-11-21 00:51


NVD link : CVE-2008-4197

Mitre link : CVE-2008-4197

CVE.ORG link : CVE-2008-4197


JSON object : View

Products Affected

linux

  • linux_kernel

microsoft

  • windows

freebsd

  • freebsd

opera

  • opera_browser

oracle

  • solaris
CWE
CWE-908

Use of Uninitialized Resource