Opera 6.0/7.0 - 'Filename Download' Buffer Overrun

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053749 漏洞类型
发布时间 2003-03-10 更新时间 2003-03-10
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22341
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7056/info

A buffer overrun vulnerability has been discovered in the Opera web browser. The issue affects Opera versions 6 and 7 on the Microsoft Windows platform.

Due to insufficient bounds checking when copying file names to a temporary buffer it may be possible for an attacker to corrupt memory. The problem occurs when downloading a file with a name of excessive length.

Successful exploitation of this issue may allow an attacker to execute arbitrary commands within a browser that downloads the malicious file.

It should be noted that this issue is limited to files that are displayed in the 'Download Dialog'.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22341.tgz