ID

VAR-201007-0237


CVE

CVE-2010-2657


TITLE

Windows and Mac OS X Run on Opera Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-002040

DESCRIPTION

Opera before 10.60 on Windows and Mac OS X does not properly prevent certain double-click operations from running a program located on a web site, which allows user-assisted remote attackers to execute arbitrary code via a crafted web page that bypasses a dialog. Opera Web Browser is prone to a remote security vulnerability. It supports multi-window browsing and a customizable user interface. ---------------------------------------------------------------------- Passionate about writing secure code? http://secunia.com/company/jobs/open_positions/talented_programmer Read this if your favourite tool is a disassembler http://secunia.com/company/jobs/open_positions/reverse_engineer ---------------------------------------------------------------------- TITLE: Opera Two Security Issues SECUNIA ADVISORY ID: SA40375 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40375/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40375 RELEASE DATE: 2010-07-01 DISCUSS ADVISORY: http://secunia.com/advisories/40375/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40375/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40375 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two security issues have been reported in Opera, which can be exploited by malicious people to disclose potentially sensitive information or compromise a user's system. 1) A design error in the "Download" dialog can be exploited cause a file to be downloaded and executed if a user is tricked into double-clicking a link on a specially crafted page. 2) An error in the handling of file upload forms can be exploited to cause a user to unintentionally upload an arbitrary file from the local file system if the user is tricked into pasting clipboard content into a form on a specially crafted web site. Successful exploitation requires that the clipboard contains a string that specifies a path to a local file, e.g. set by a plug-in. The security issues are reported in versions prior to 10.60. SOLUTION: Update to version 10.60. PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor. 2) The vendor credits Andrew Valums. ORIGINAL ADVISORY: Opera: http://www.opera.com/docs/changelogs/windows/1060/ http://www.opera.com/support/kb/view/957/ http://www.opera.com/support/kb/view/958/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2010-2657 // JVNDB: JVNDB-2010-002040 // BID: 78905 // VULHUB: VHN-45262 // PACKETSTORM: 91367

AFFECTED PRODUCTS

vendor:operamodel:browserscope:ltversion:10.60

Trust: 1.0

vendor:opera asamodel:operascope:ltversion:10.60

Trust: 0.8

vendor:operamodel:browserscope:eqversion:10.52

Trust: 0.6

vendor:operamodel:browserscope:eqversion:10.10

Trust: 0.6

vendor:operamodel:browserscope:eqversion:10.54

Trust: 0.6

vendor:operamodel:browserscope:eqversion:10.51

Trust: 0.6

vendor:operamodel:browserscope:eqversion:10.53

Trust: 0.6

vendor:operamodel:browserscope:eqversion:10.50

Trust: 0.6

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.23

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.64

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.63

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.62

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.61

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.601

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.60

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.27

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.26

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.25

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.24

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.23

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.22

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.21

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.201

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.20

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.02

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:operamodel:software opera web browser beta3scope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.60

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.54

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:10.53

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.53

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.52

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.51

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.01

Trust: 0.3

vendor:operamodel:software opera web browser beta3scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.00

Trust: 0.3

sources: BID: 78905 // JVNDB: JVNDB-2010-002040 // CNNVD: CNNVD-201007-066 // NVD: CVE-2010-2657

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2657
value: HIGH

Trust: 1.0

NVD: CVE-2010-2657
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201007-066
value: CRITICAL

Trust: 0.6

VULHUB: VHN-45262
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-2657
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-45262
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-45262 // JVNDB: JVNDB-2010-002040 // CNNVD: CNNVD-201007-066 // NVD: CVE-2010-2657

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-45262 // JVNDB: JVNDB-2010-002040 // NVD: CVE-2010-2657

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201007-066

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201007-066

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002040

PATCH

title:957url:http://www.opera.com/support/kb/view/957

Trust: 0.8

title:windows/1060url:http://www.opera.com/docs/changelogs/windows/1060

Trust: 0.8

title:mac/1060url:http://www.opera.com/docs/changelogs/mac/1060

Trust: 0.8

title:Opera 10.60 for Windowsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5911

Trust: 0.6

sources: JVNDB: JVNDB-2010-002040 // CNNVD: CNNVD-201007-066

EXTERNAL IDS

db:NVDid:CVE-2010-2657

Trust: 2.8

db:SECUNIAid:40375

Trust: 2.6

db:VUPENid:ADV-2010-1664

Trust: 2.5

db:JVNDBid:JVNDB-2010-002040

Trust: 0.8

db:CNNVDid:CNNVD-201007-066

Trust: 0.7

db:BIDid:78905

Trust: 0.4

db:VULHUBid:VHN-45262

Trust: 0.1

db:PACKETSTORMid:91367

Trust: 0.1

sources: VULHUB: VHN-45262 // BID: 78905 // JVNDB: JVNDB-2010-002040 // PACKETSTORM: 91367 // CNNVD: CNNVD-201007-066 // NVD: CVE-2010-2657

REFERENCES

url:http://secunia.com/advisories/40375

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/1664

Trust: 2.5

url:http://www.opera.com/docs/changelogs/windows/1060/

Trust: 2.1

url:http://www.opera.com/docs/changelogs/mac/1060/

Trust: 2.0

url:http://www.opera.com/support/search/view/957/

Trust: 2.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11856

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2657

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2657

Trust: 0.8

url:http://www.opera.com/support/kb/view/958/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40375

Trust: 0.1

url:http://secunia.com/company/jobs/open_positions/talented_programmer

Trust: 0.1

url:http://secunia.com/advisories/40375/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/company/jobs/open_positions/reverse_engineer

Trust: 0.1

url:http://www.opera.com/support/kb/view/957/

Trust: 0.1

url:http://secunia.com/advisories/40375/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-45262 // BID: 78905 // JVNDB: JVNDB-2010-002040 // PACKETSTORM: 91367 // CNNVD: CNNVD-201007-066 // NVD: CVE-2010-2657

CREDITS

Unknown

Trust: 0.3

sources: BID: 78905

SOURCES

db:VULHUBid:VHN-45262
db:BIDid:78905
db:JVNDBid:JVNDB-2010-002040
db:PACKETSTORMid:91367
db:CNNVDid:CNNVD-201007-066
db:NVDid:CVE-2010-2657

LAST UPDATE DATE

2024-11-23T20:08:21.967000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-45262date:2018-11-16T00:00:00
db:BIDid:78905date:2010-07-08T00:00:00
db:JVNDBid:JVNDB-2010-002040date:2010-09-27T00:00:00
db:CNNVDid:CNNVD-201007-066date:2021-09-09T00:00:00
db:NVDid:CVE-2010-2657date:2024-11-21T01:17:06.643

SOURCES RELEASE DATE

db:VULHUBid:VHN-45262date:2010-07-08T00:00:00
db:BIDid:78905date:2010-07-08T00:00:00
db:JVNDBid:JVNDB-2010-002040date:2010-09-27T00:00:00
db:PACKETSTORMid:91367date:2010-07-01T16:59:50
db:CNNVDid:CNNVD-201007-066date:2010-07-12T00:00:00
db:NVDid:CVE-2010-2657date:2010-07-08T12:54:47.240