A race condition in Opera web browser 7.53 Build 3850 causes Opera to fill in the address bar before the page has been loaded, which allows remote attackers to spoof the URL in the address bar via the window.open and location.replace HTML parameters, which facilitates phishing attacks.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/16816 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html | mailing list exploit broken link |
http://secunia.com/advisories/12162 | third party advisory patch broken link |
http://www.opera.com/windows/changelogs/754/ | patch broken link |
http://www.osvdb.org/8317 | exploit vdb entry broken link |
http://www.securityfocus.com/bid/10810 | patch exploit vdb entry third party advisory broken link |