Buffer overflow in Opera 6.05 and 6.06, and possibly other versions, allows remote attackers to execute arbitrary code via a URL with a long username.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/315794 | mailing list exploit vdb entry third party advisory broken link |
http://www.securityfocus.com/archive/1/311194 | mailing list vdb entry third party advisory broken link |
http://www.securityfocus.com/bid/6811 | patch vdb entry third party advisory broken link |
http://securityreason.com/securityalert/3253 | third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 | vdb entry third party advisory |