diff options
author | simon <simon@FreeBSD.org> | 2005-11-30 20:35:51 +0000 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-11-30 20:35:51 +0000 |
commit | 46593c0d52d5c317c32c6eae07e86590060b3a93 (patch) | |
tree | a11943ef1fb7b0de0cac54690757f3683a9c013a | |
parent | aa151de6ec2d182ed8747e8505cb28d4a5301e48 (diff) | |
download | FreeBSD-ports-46593c0d52d5c317c32c6eae07e86590060b3a93.zip FreeBSD-ports-46593c0d52d5c317c32c6eae07e86590060b3a93.tar.gz |
Document opera -- command line URL shell command injection.
-rw-r--r-- | security/vuxml/vuln.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b18d19e..60f66c1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,46 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="dfc1daa8-61de-11da-b64c-0001020eed82"> + <topic>opera -- command line URL shell command injection</topic> + <affects> + <package> + <name>linux-opera</name> + <name>opera-devel</name> + <name>opera</name> + <range><lt>8.51</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>An Opera Advisory reports:</p> + <blockquote cite="http://www.opera.com/support/search/supsearch.dml?index=818"> + <p>Opera for UNIX uses a wrapper shell script to start up + Opera. This shell script reads the input arguments, like + the file names or URLs that Opera is to open. It also + performs some environment checks, for example whether Java + is available and if so, where it is located.</p> + <p>This wrapper script can also run commands embedded in the + URL, so that a specially crafted URL can make arbitrary + commands run on the recipient's machine. Users who have + other programs set up to use Opera to open Web links are + vulnerable to this flaw. For these users, clicking a Web + link in for example OpenOffice.org or Evolution can run a + command that was put into the link.</p> + </blockquote> + </body> + </description> + <references> + <bid>15521</bid> + <cvename>CVE-2005-3750</cvename> + <url>http://secunia.com/secunia_research/2005-57/advisory/</url> + <url>http://www.opera.com/support/search/supsearch.dml?index=818</url> + </references> + <dates> + <discovery>2005-11-17</discovery> + <entry>2005-11-30</entry> + </dates> + </vuln> <vuln vid="ffb82d3a-610f-11da-8823-00123ffe8333"> <topic>mambo -- "register_globals" emulation layer overwrite vulnerability</topic> |