Buffer overflow in the transfer manager in Opera before 9.21 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted torrent file. NOTE: due to the lack of details, it is not clear if this is the same issue as CVE-2007-2274.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/1888 | vdb entry broken link |
http://securitytracker.com/id?1018089 | broken link third party advisory vdb entry |
http://isc.sans.org/diary.html?storyid=2823 | third party advisory patch |
http://www.opera.com/support/search/view/860/ | broken link |
http://osvdb.org/36229 | vdb entry broken link |
http://secunia.com/advisories/25278 | patch broken link third party advisory |
http://www.securityfocus.com/bid/24080 | broken link third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34470 | third party advisory vdb entry |