Opera offers an Open button to verify that a user wishes to execute a downloaded file, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking Open via a request for a different mouse or keyboard action very shortly before the Open dialog appears. NOTE: this is a different issue than CVE-2005-2407.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ | vendor advisory exploit |
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html | broken link mailing list exploit |