Opera Web Browser HTML Parsing 堆远程代码执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1184251 漏洞类型 资源管理错误
发布时间 2008-12-16 更新时间 2009-03-17
CVE编号 CVE-2008-5679 CNNVD-ID CNNVD-200812-392
漏洞平台 N/A CVSS评分 9.3
|漏洞来源
https://www.securityfocus.com/bid/32891
https://cxsecurity.com/issue/WLB-2008120180
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-392
|漏洞详情
Opera是一款出色而小巧的网页浏览器。Opera9.63之前的版本的HTML分析引擎允许远程攻击者可以借助特制的可以触发一个无效指针运算和堆损耗的网页,执行任意代码。
|漏洞EXP
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

n.runs AG
http://www.nruns.com/                             security(at)nruns.com
n.runs-SA-2008.010                                          16-Dec-2008
_______________________________________________________________________

Vendor:                Opera Software ASA, http://www.opera.com
Affected Products:     Opera Browser all platforms
Vulnerability:         HTML parsing flaw lead to remote code execution
Risk:                  HIGH
_______________________________________________________________________

Vendor communication:

2008/11/10    Initial notification to Opera including n.runs RFP and 
              n.runs PGP public key
2008/11/12    Opera response and remarks to agree in general with 
              n.runs RFP but depending on the issue the timeline for a
              fix might have to be longer than the one mentioned in
              n.runs RFP (30 days)
2008/11/12    n.runs replies and outlines following a responsible
              disclosure policy as long as Opera keep n.runs in the
              loop. n.runs send with same email a zip archive including
              two PoC files and detailed crash log analysis
2008/11/14    n.runs resends the last email with a download link for
              the PoCs because Opera's MX Server did not accept the
              enclosed encrypted zip archive
2008/11/14    Opera acknowledges the PoC files
2008/11/24    Opera communicates to n.runs that they identified the
              nature of the issue and that they are looking into a fix
2008/12/12    Opera sends n.runs a current draft of the Opera advisory
              and notifies new version is scheduled to be released
              early next week
2008/12/16    Opera releases Opera 9.63 [1]
2008/12/16    n.runs releases this advisory

_______________________________________________________________________

Overview:

Quoting http://www.opera.com/company/:
"Opera started in 1994 as a research project within Norway's largest 
telecom company, Telenor. Within a year, it branched out to become an
independent development company named Opera Software ASA.

Today, Opera Software develops the Opera Web browser, a high-quality,
multi-platform product for a wide range of platforms, operating systems
and embedded Internet products - including Mac, PC and Linux computers, 
mobile phones and PDAs,game consoles and other devices like the 
Nintendo Wii and DS, Sony Mylo and more.

Opera's vision is to deliver the best Internet experience on any 
device. Opera's key business objective is to earn global leadership in
the market for PC / desktops and embedded products. Opera's main 
business strategy is to provide a browser that operates across devices,
platforms and operating systems, and can deliver a faster, more stable
and flexible Internet experience than its competitors."

Description:

A remotely exploitable vulnerability has been found in the
HTML parsing engine.

In detail, the following flaw was determined:

- - Certain HTML constructs affecting an internal heap structure. As a
result of a pointer calculation, memory may be corrupted in such a way
that an attacker could execute arbitrary code.

Impact

An attacker could exploit the vulnerability by constructing a specially
prepared Websit. When a user views the Web page, the vulnerability
could allow remote code execution. An attacker who successfully
exploits this vulnerability could gain the same user rights as the
logged-on user.

Solution:

Opera has issued an update to correct this vulnerability.
For detailed information about the fixes follow the link in
References [1] section of this document.

n.runs AG wants to highlight the fluent communication with Opera and
its very quick response to validate and fix the issue.
_______________________________________________________________________

Credit: 
Bugs found by Alexios Fakos of n.runs AG. 
_______________________________________________________________________

References: 
http://www.opera.com/support/kb/view/921/ [1]

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
_______________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For 
all other reproduction or publication, in printing or otherwise, 
contact security (at) nruns (dot) com [email concealed] for permission. Use of the advisory 
constitutes acceptance for use in an "as is" condition. All warranties
are excluded. In no event shall n.runs be liable for any damages 
whatsoever including direct, indirect, incidental, consequential loss 
of business profits or special damages, even if n.runs has been advised
of the possibility of such damages.

Copyright 2008 n.runs AG. All rights reserved. Terms of use apply.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.1 (Build 2523)
Charset: us-ascii
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=opn5
-----END PGP SIGNATURE-----
|受影响的产品
Opera Software Opera Web Browser 9.62 Opera Software Opera Web Browser 9.61 Opera Software Opera Web Browser 9.60 beta 1 Opera Software Opera Web Browser 9.60 Opera Software Opera Web Bro
|参考资料

来源:SECTRACK
名称:1021460
链接:http://www.securitytracker.com/id?1021460
来源:BUGTRAQ
名称:20081217n.runs-SA-2008.010-OperaHTMLparsingCodeExecution
链接:http://www.securityfocus.com/archive/1/archive/1/499315/100/0/threaded
来源:www.opera.com
链接:http://www.opera.com/support/kb/view/921/
来源:www.opera.com
链接:http://www.opera.com/docs/changelogs/linux/963/
来源:MISC
链接:http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php
来源:SREASON
名称:4791
链接:http://securityreason.com/securityalert/4791
来源:GENTOO
名称:GLSA-200903-30
链接:http://security.gentoo.org/glsa/glsa-200903-30.xml
来源:SECUNIA
名称:34294
链接:http://secunia.com/advisories/34294