ID

VAR-201005-0393


CVE

CVE-2010-1728


TITLE

Windows and Mac OS X Run on Opera Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-002033

DESCRIPTION

Opera before 10.53 on Windows and Mac OS X does not properly handle a series of document modifications that occur asynchronously, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop, leading to attempted use of uninitialized memory. NOTE: this might overlap CVE-2006-6955. This vulnerability CVE-2006-6955 And may be duplicated.By a third party JavaScript Any code can be executed via, or service disruption (DoS) There is a possibility of being put into a state. Opera Web Browser is prone to a denial-of-service vulnerability. It supports multi-window browsing and a customizable user interface. The vulnerability could result in the use of uninitialized memory. ---------------------------------------------------------------------- Proof-of-Concept (PoC) and Extended Analysis available for customers. Get a free trial, contact sales@secunia.com ---------------------------------------------------------------------- TITLE: Opera Content Writing Uninitialised Memory Vulnerability SECUNIA ADVISORY ID: SA39590 VERIFY ADVISORY: http://secunia.com/advisories/39590/ DESCRIPTION: A vulnerability has been discovered in Opera, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when e.g. continuously writing content to a page using document.write() and results in a function call using uninitialised memory when a user visits a specially crafted web page. Successful exploitation may allow execution of arbitrary code. The vulnerability is confirmed in version 10.52 for Windows. Other versions may also be affected. SOLUTION: Do not browse untrusted web sites of follow links from untrusted sources. PROVIDED AND/OR DISCOVERED BY: Reported as a crash by Mathias Karlsson. Additional information provided by Secunia Research. ORIGINAL ADVISORY: Mathias Karlsson: http://h.ackack.net/?p=258 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2010-1728 // JVNDB: JVNDB-2010-002033 // BID: 78966 // VULHUB: VHN-44333 // PACKETSTORM: 88982

AFFECTED PRODUCTS

vendor:operamodel:browserscope:eqversion:9.02

Trust: 1.6

vendor:operamodel:browserscope:eqversion:9.01

Trust: 1.6

vendor:operamodel:browserscope:eqversion:8.52

Trust: 1.6

vendor:operamodel:browserscope:eqversion:9.20

Trust: 1.6

vendor:operamodel:browserscope:eqversion:9.0

Trust: 1.6

vendor:operamodel:browserscope:eqversion:9.10

Trust: 1.6

vendor:operamodel:browserscope:eqversion:8.54

Trust: 1.6

vendor:operamodel:browserscope:eqversion:8.51

Trust: 1.6

vendor:operamodel:browserscope:eqversion:5.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.53

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.25

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.26

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.21

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.63

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.22

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.60

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.64

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.60

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.05

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.20

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.61

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.54

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.03

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.51

Trust: 1.0

vendor:operamodel:browserscope:lteversion:10.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.06

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.00

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.03

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.24

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.22

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.27

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.04

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.1

Trust: 1.0

vendor:opera asamodel:operascope:ltversion:10.53

Trust: 0.8

vendor:operamodel:browserscope:eqversion:9.00

Trust: 0.6

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.64

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.63

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.61

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.60

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.27

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.26

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.25

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.24

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.22

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.201

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.20

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.02

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.51

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.01

Trust: 0.3

vendor:operamodel:software opera web browser beta3scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.00

Trust: 0.3

sources: BID: 78966 // JVNDB: JVNDB-2010-002033 // CNNVD: CNNVD-201005-066 // NVD: CVE-2010-1728

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1728
value: HIGH

Trust: 1.0

NVD: CVE-2010-1728
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201005-066
value: CRITICAL

Trust: 0.6

VULHUB: VHN-44333
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1728
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-44333
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44333 // JVNDB: JVNDB-2010-002033 // CNNVD: CNNVD-201005-066 // NVD: CVE-2010-1728

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-44333 // JVNDB: JVNDB-2010-002033 // NVD: CVE-2010-1728

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201005-066

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201005-066

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002033

PATCH

title:953url:http://www.opera.com/support/kb/view/953

Trust: 0.8

title:windows/1053url:http://www.opera.com/docs/changelogs/windows/1053

Trust: 0.8

title:mac/1053url:http://www.opera.com/docs/changelogs/mac/1053

Trust: 0.8

sources: JVNDB: JVNDB-2010-002033

EXTERNAL IDS

db:NVDid:CVE-2010-1728

Trust: 2.8

db:SECUNIAid:39590

Trust: 2.6

db:VUPENid:ADV-2010-0999

Trust: 2.5

db:XFid:58231

Trust: 1.7

db:JVNDBid:JVNDB-2010-002033

Trust: 0.8

db:CNNVDid:CNNVD-201005-066

Trust: 0.7

db:BIDid:78966

Trust: 0.4

db:VULHUBid:VHN-44333

Trust: 0.1

db:PACKETSTORMid:88982

Trust: 0.1

sources: VULHUB: VHN-44333 // BID: 78966 // JVNDB: JVNDB-2010-002033 // PACKETSTORM: 88982 // CNNVD: CNNVD-201005-066 // NVD: CVE-2010-1728

REFERENCES

url:http://secunia.com/advisories/39590

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0999

Trust: 2.5

url:http://h.ackack.net/?p=258

Trust: 2.1

url:http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac

Trust: 2.0

url:http://www.opera.com/docs/changelogs/mac/1053/

Trust: 2.0

url:http://www.opera.com/docs/changelogs/windows/1053/

Trust: 2.0

url:http://www.opera.com/support/kb/view/953/

Trust: 2.0

url:http://xforce.iss.net/xforce/xfdb/58231

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11927

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/58231

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1728

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1728

Trust: 0.8

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/39590/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-44333 // BID: 78966 // JVNDB: JVNDB-2010-002033 // PACKETSTORM: 88982 // CNNVD: CNNVD-201005-066 // NVD: CVE-2010-1728

CREDITS

Unknown

Trust: 0.3

sources: BID: 78966

SOURCES

db:VULHUBid:VHN-44333
db:BIDid:78966
db:JVNDBid:JVNDB-2010-002033
db:PACKETSTORMid:88982
db:CNNVDid:CNNVD-201005-066
db:NVDid:CVE-2010-1728

LAST UPDATE DATE

2024-11-23T22:53:40.782000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44333date:2018-10-30T00:00:00
db:BIDid:78966date:2010-05-06T00:00:00
db:JVNDBid:JVNDB-2010-002033date:2010-09-27T00:00:00
db:CNNVDid:CNNVD-201005-066date:2010-05-06T00:00:00
db:NVDid:CVE-2010-1728date:2024-11-21T01:15:04.307

SOURCES RELEASE DATE

db:VULHUBid:VHN-44333date:2010-05-06T00:00:00
db:BIDid:78966date:2010-05-06T00:00:00
db:JVNDBid:JVNDB-2010-002033date:2010-09-27T00:00:00
db:PACKETSTORMid:88982date:2010-04-27T05:38:25
db:CNNVDid:CNNVD-201005-066date:2010-05-06T00:00:00
db:NVDid:CVE-2010-1728date:2010-05-06T14:53:01.563