VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2658
opera_browser: Opera before 10.60 does not properly restrict certa...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2658

Original

Opera before 10.60 does not properly restrict certain interaction between plug-ins, file inputs, and the clipboard, which allows user-assisted remote attackers to trigger the uploading of arbitrary files via a crafted web site.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-07-08
Source Information Category:
Advisory, Alert
Last Updated:
2010-07-08




Affected Product Tags
cpe:/a:opera:opera_browser:10.00
cpe:/a:opera:opera_browser:10.00:beta1
cpe:/a:opera:opera_browser:10.00:beta2
cpe:/a:opera:opera_browser:10.00:beta3
cpe:/a:opera:opera_browser:10.01
cpe:/a:opera:opera_browser:10.10
cpe:/a:opera:opera_browser:10.10:beta1
cpe:/a:opera:opera_browser:10.11
cpe:/a:opera:opera_browser:10.50
cpe:/a:opera:opera_browser:10.50:beta1
cpe:/a:opera:opera_browser:10.50:beta2
cpe:/a:opera:opera_browser:10.51
cpe:/a:opera:opera_browser:10.52
cpe:/a:opera:opera_browser:10.52:beta1
cpe:/a:opera:opera_browser:10.52:beta2
cpe:/a:opera:opera_browser:10.53
cpe:/a:opera:opera_browser:10.53:b
cpe:/a:opera:opera_browser:10.54
cpe:/a:opera:opera_browser:10.60:beta1 and previous versions
cpe:/a:opera:opera_browser:5.0
cpe:/a:opera:opera_browser:5.02
cpe:/a:opera:opera_browser:5.0:beta2
cpe:/a:opera:opera_browser:5.0:beta3
cpe:/a:opera:opera_browser:5.0:beta4
cpe:/a:opera:opera_browser:5.0:beta5
cpe:/a:opera:opera_browser:5.0:beta6
cpe:/a:opera:opera_browser:5.0:beta7
cpe:/a:opera:opera_browser:5.0:beta8
cpe:/a:opera:opera_browser:5.10
cpe:/a:opera:opera_browser:5.11
cpe:/a:opera:opera_browser:5.12
cpe:/a:opera:opera_browser:6.0
cpe:/a:opera:opera_browser:6.01
cpe:/a:opera:opera_browser:6.02
cpe:/a:opera:opera_browser:6.03
cpe:/a:opera:opera_browser:6.04
cpe:/a:opera:opera_browser:6.05
cpe:/a:opera:opera_browser:6.06
cpe:/a:opera:opera_browser:6.0:beta1
cpe:/a:opera:opera_browser:6.0:beta2
cpe:/a:opera:opera_browser:6.0:beta3
cpe:/a:opera:opera_browser:6.0:tp1
cpe:/a:opera:opera_browser:6.0:tp2
cpe:/a:opera:opera_browser:6.0:tp3
cpe:/a:opera:opera_browser:6.1
cpe:/a:opera:opera_browser:6.11
cpe:/a:opera:opera_browser:6.12
cpe:/a:opera:opera_browser:6.1:beta1
cpe:/a:opera:opera_browser:7.0
cpe:/a:opera:opera_browser:7.01
cpe:/a:opera:opera_browser:7.02
cpe:/a:opera:opera_browser:7.03
cpe:/a:opera:opera_browser:7.0:beta1
cpe:/a:opera:opera_browser:7.0:beta1_v2
cpe:/a:opera:opera_browser:7.0:beta2
cpe:/a:opera:opera_browser:7.10
cpe:/a:opera:opera_browser:7.10:beta1
cpe:/a:opera:opera_browser:7.11
cpe:/a:opera:opera_browser:7.11:beta2
cpe:/a:opera:opera_browser:7.20
cpe:/a:opera:opera_browser:7.20:beta7
cpe:/a:opera:opera_browser:7.21
cpe:/a:opera:opera_browser:7.22
cpe:/a:opera:opera_browser:7.23
cpe:/a:opera:opera_browser:7.50
cpe:/a:opera:opera_browser:7.50:beta1
cpe:/a:opera:opera_browser:7.51
cpe:/a:opera:opera_browser:7.52
cpe:/a:opera:opera_browser:7.53
cpe:/a:opera:opera_browser:7.54
cpe:/a:opera:opera_browser:7.54:update1
cpe:/a:opera:opera_browser:7.54:update2
cpe:/a:opera:opera_browser:7.60
cpe:/a:opera:opera_browser:8.0
cpe:/a:opera:opera_browser:8.00
cpe:/a:opera:opera_browser:8.01
cpe:/a:opera:opera_browser:8.02
cpe:/a:opera:opera_browser:8.0:beta1
cpe:/a:opera:opera_browser:8.0:beta2
cpe:/a:opera:opera_browser:8.0:beta3
cpe:/a:opera:opera_browser:8.50
cpe:/a:opera:opera_browser:8.51
cpe:/a:opera:opera_browser:8.52
cpe:/a:opera:opera_browser:8.53
cpe:/a:opera:opera_browser:8.54
cpe:/a:opera:opera_browser:9.0
cpe:/a:opera:opera_browser:9.00
cpe:/a:opera:opera_browser:9.01
cpe:/a:opera:opera_browser:9.02
cpe:/a:opera:opera_browser:9.0:beta1
cpe:/a:opera:opera_browser:9.0:beta2
cpe:/a:opera:opera_browser:9.10
cpe:/a:opera:opera_browser:9.12
cpe:/a:opera:opera_browser:9.20
cpe:/a:opera:opera_browser:9.20:beta1
cpe:/a:opera:opera_browser:9.21
cpe:/a:opera:opera_browser:9.22
cpe:/a:opera:opera_browser:9.23
cpe:/a:opera:opera_browser:9.24
cpe:/a:opera:opera_browser:9.25
cpe:/a:opera:opera_browser:9.26
cpe:/a:opera:opera_browser:9.27
cpe:/a:opera:opera_browser:9.50
cpe:/a:opera:opera_browser:9.50:beta1
cpe:/a:opera:opera_browser:9.50:beta2
cpe:/a:opera:opera_browser:9.51
cpe:/a:opera:opera_browser:9.52
cpe:/a:opera:opera_browser:9.60
cpe:/a:opera:opera_browser:9.60:beta1
cpe:/a:opera:opera_browser:9.61
cpe:/a:opera:opera_browser:9.62
cpe:/a:opera:opera_browser:9.63
cpe:/a:opera:opera_browser:9.64
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

Alternatives




References
CONFIRM http://www.opera.com/support/search/view/958/




CONFIRM http://www.opera.com/docs/changelogs/windows/1060/




CONFIRM http://www.opera.com/docs/changelogs/unix/1060/




CONFIRM http://www.opera.com/docs/changelogs/mac/1060/




SECUNIA 40375




VUPEN ADV-2010-1673




VUPEN ADV-2010-1664




Vulnerability Type Input Validation (CWE-20)





Copyright © 2010 JPCERT/CC All Rights Reserved.