ID

VAR-201203-0164


CVE

CVE-2012-1929


TITLE

Mac OS X Run on Opera Vulnerable to spoofing address field and security dialog

Trust: 0.8

sources: JVNDB: JVNDB-2012-001942

DESCRIPTION

Opera before 11.62 on Mac OS X allows remote attackers to spoof the address field and security dialogs via crafted styling that causes page content to be displayed outside of the intended content area. Opera web browser is prone to a cross-domain scripting vulnerability, multiple remote code-execution vulnerabilities, and multiple address bar URI-spoofing vulnerabilities. An attacker can exploit these issues to execute arbitrary code, display arbitrary content while showing the URI of a trusted website in the address bar in order to perform phishing attacks or to bypass same-origin protection to obtain potentially sensitive information. Other attacks are also possible. Opera versions priror to 11.62 are vulnerable. Opera is a web browser developed by Opera Software in Norway. It supports multi-window browsing and a customizable user interface. The vulnerability exists in versions of Opera prior to 11.62 based on Mac OS X. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Opera Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48535 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48535/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48535 RELEASE DATE: 2012-03-27 DISCUSS ADVISORY: http://secunia.com/advisories/48535/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48535/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48535 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. 1) An error when displaying the download dialog box within a small window can be exploited to download and execute a file by tricking a user into entering a specific keyboard sequence. 2) An error when displaying the download dialog box can be exploited to overlay the box with other content subsequently tricking a user into downloading and executing a file. 3) An error when handling history.state of sites implementing history.pushState and history.replaceState can be exploited to bypass the cross-domain policy restriction and disclose certain information to other sites. The vulnerabilities are reported in versions prior to 11.62. SOLUTION: Update to version 11.62. PROVIDED AND/OR DISCOVERED BY: 1,2,5) The vendor credits Jordi Chancel. 3,4) Reported by the vendor. ORIGINAL ADVISORY: Opera: http://www.opera.com/docs/changelogs/windows/1162/ http://www.opera.com/support/kb/view/1010/ http://www.opera.com/support/kb/view/1011/ http://www.opera.com/support/kb/view/1012/ http://www.opera.com/support/kb/view/1013/ http://www.opera.com/support/kb/view/1014/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2012-1929 // JVNDB: JVNDB-2012-001942 // BID: 52731 // VULHUB: VHN-55210 // VULMON: CVE-2012-1929 // PACKETSTORM: 111213

AFFECTED PRODUCTS

vendor:operamodel:browserscope:eqversion:11.60

Trust: 1.6

vendor:operamodel:browserscope:eqversion:11.51

Trust: 1.6

vendor:operamodel:browserscope:eqversion:11.50

Trust: 1.6

vendor:operamodel:browserscope:eqversion:11.11

Trust: 1.6

vendor:operamodel:browserscope:eqversion:11.52

Trust: 1.6

vendor:operamodel:browserscope:eqversion:11.10

Trust: 1.6

vendor:operamodel:browserscope:eqversion:8.53

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.53

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.23

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.23

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.20

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.22

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.60

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.54

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.53

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.54

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.62

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.54

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.60

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.00

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.03

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.52

Trust: 1.0

vendor:operamodel:browserscope:lteversion:11.61

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.27

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.61

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.1

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.25

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.63

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.26

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.21

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.63

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.64

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.05

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.20

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.61

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.03

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.06

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.24

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.22

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.21

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.62

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.04

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:10.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.52

Trust: 1.0

vendor:opera asamodel:operascope:ltversion:11.62 (mac)

Trust: 0.8

vendor:operamodel:browserscope:eqversion:11.61

Trust: 0.6

vendor:operamodel:software opera web browserscope:eqversion:11.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.10

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:operamodel:software operascope:eqversion:11.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.00

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.60

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browserscope:neversion:11.62

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.52

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.51

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.60

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:10.53

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.54

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.53

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.63

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.01

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.60

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.00

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.62

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.61

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.61

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.01

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10

Trust: 0.3

vendor:operamodel:software opera web browser beta3scope:eqversion:10.00

Trust: 0.3

sources: BID: 52731 // JVNDB: JVNDB-2012-001942 // CNNVD: CNNVD-201203-522 // NVD: CVE-2012-1929

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1929
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-1929
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-522
value: MEDIUM

Trust: 0.6

VULHUB: VHN-55210
value: MEDIUM

Trust: 0.1

VULMON: CVE-2012-1929
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-1929
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-55210
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55210 // VULMON: CVE-2012-1929 // JVNDB: JVNDB-2012-001942 // CNNVD: CNNVD-201203-522 // NVD: CVE-2012-1929

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-55210 // JVNDB: JVNDB-2012-001942 // NVD: CVE-2012-1929

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-522

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201203-522

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001942

PATCH

title:Opera 11.62 for Windows changelogurl:http://www.opera.com/docs/changelogs/windows/1162/

Trust: 0.8

title:Opera 11.62 for Mac changelogurl:http://www.opera.com/docs/changelogs/mac/1162/

Trust: 0.8

title:Advisory: Web page content may overlap the address fieldurl:http://www.opera.com/support/kb/view/1009/

Trust: 0.8

title:Advisory: Web page dialogs can be used to to display the wrong address in the address fieldurl:http://www.opera.com/support/kb/view/1013/

Trust: 0.8

sources: JVNDB: JVNDB-2012-001942

EXTERNAL IDS

db:NVDid:CVE-2012-1929

Trust: 2.9

db:SECUNIAid:48535

Trust: 1.3

db:JVNDBid:JVNDB-2012-001942

Trust: 0.8

db:CNNVDid:CNNVD-201203-522

Trust: 0.7

db:BIDid:52731

Trust: 0.4

db:VULHUBid:VHN-55210

Trust: 0.1

db:VULMONid:CVE-2012-1929

Trust: 0.1

db:PACKETSTORMid:111213

Trust: 0.1

sources: VULHUB: VHN-55210 // VULMON: CVE-2012-1929 // BID: 52731 // JVNDB: JVNDB-2012-001942 // PACKETSTORM: 111213 // CNNVD: CNNVD-201203-522 // NVD: CVE-2012-1929

REFERENCES

url:http://www.opera.com/docs/changelogs/mac/1162/

Trust: 1.8

url:http://www.opera.com/support/kb/view/1009/

Trust: 1.8

url:http://www.opera.com/docs/changelogs/windows/1162/

Trust: 1.6

url:http://www.opera.com/support/kb/view/1013/

Trust: 1.6

url:http://secunia.com/advisories/48535

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74352

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1929

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1929

Trust: 0.8

url:http://www.opera.com/support/kb/view/1014/

Trust: 0.4

url:http://www.opera.com/support/kb/view/1012/

Trust: 0.4

url:http://www.opera.com/support/kb/view/1011/

Trust: 0.4

url:http://www.opera.com/support/kb/view/1010/

Trust: 0.4

url:http://www.opera.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/52731

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/48535/#comments

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/48535/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48535

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-55210 // VULMON: CVE-2012-1929 // BID: 52731 // JVNDB: JVNDB-2012-001942 // PACKETSTORM: 111213 // CNNVD: CNNVD-201203-522 // NVD: CVE-2012-1929

CREDITS

Reported by the vendor and Jordi Chancel

Trust: 0.3

sources: BID: 52731

SOURCES

db:VULHUBid:VHN-55210
db:VULMONid:CVE-2012-1929
db:BIDid:52731
db:JVNDBid:JVNDB-2012-001942
db:PACKETSTORMid:111213
db:CNNVDid:CNNVD-201203-522
db:NVDid:CVE-2012-1929

LAST UPDATE DATE

2024-11-23T20:59:43.930000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-55210date:2018-01-05T00:00:00
db:VULMONid:CVE-2012-1929date:2018-01-05T00:00:00
db:BIDid:52731date:2012-05-11T15:40:00
db:JVNDBid:JVNDB-2012-001942date:2012-11-13T00:00:00
db:CNNVDid:CNNVD-201203-522date:2012-03-29T00:00:00
db:NVDid:CVE-2012-1929date:2024-11-21T01:38:04.707

SOURCES RELEASE DATE

db:VULHUBid:VHN-55210date:2012-03-28T00:00:00
db:VULMONid:CVE-2012-1929date:2012-03-28T00:00:00
db:BIDid:52731date:2012-03-27T00:00:00
db:JVNDBid:JVNDB-2012-001942date:2012-03-29T00:00:00
db:PACKETSTORMid:111213date:2012-03-27T05:59:53
db:CNNVDid:CNNVD-201203-522date:2012-03-29T00:00:00
db:NVDid:CVE-2012-1929date:2012-03-28T03:22:10.397