VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2660
opera_browser: Opera before 10.54 on Windows and Mac OS X, and bef...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2660

Original

Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-07-08
Source Information Category:
Advisory, Alert
Last Updated:
2010-07-08




Affected Product Tags
cpe:/a:opera:opera_browser:10.00
cpe:/a:opera:opera_browser:10.00:beta1
cpe:/a:opera:opera_browser:10.00:beta2
cpe:/a:opera:opera_browser:10.00:beta3
cpe:/a:opera:opera_browser:10.01
cpe:/a:opera:opera_browser:10.10
cpe:/a:opera:opera_browser:10.10:beta1
cpe:/a:opera:opera_browser:10.11
cpe:/a:opera:opera_browser:10.50
cpe:/a:opera:opera_browser:10.50:beta1
cpe:/a:opera:opera_browser:10.51
cpe:/a:opera:opera_browser:10.52
cpe:/a:opera:opera_browser:10.52:beta1
cpe:/a:opera:opera_browser:10.52:beta2
cpe:/a:opera:opera_browser:10.53 and previous versions
cpe:/a:opera:opera_browser:10.53:b
cpe:/a:opera:opera_browser:10.60:beta1 and previous versions
cpe:/a:opera:opera_browser:5.0
cpe:/a:opera:opera_browser:5.02
cpe:/a:opera:opera_browser:5.0:beta2
cpe:/a:opera:opera_browser:5.0:beta3
cpe:/a:opera:opera_browser:5.0:beta4
cpe:/a:opera:opera_browser:5.0:beta5
cpe:/a:opera:opera_browser:5.0:beta6
cpe:/a:opera:opera_browser:5.0:beta7
cpe:/a:opera:opera_browser:5.0:beta8
cpe:/a:opera:opera_browser:5.10
cpe:/a:opera:opera_browser:5.11
cpe:/a:opera:opera_browser:5.12
cpe:/a:opera:opera_browser:6.0
cpe:/a:opera:opera_browser:6.01
cpe:/a:opera:opera_browser:6.02
cpe:/a:opera:opera_browser:6.03
cpe:/a:opera:opera_browser:6.04
cpe:/a:opera:opera_browser:6.05
cpe:/a:opera:opera_browser:6.06
cpe:/a:opera:opera_browser:6.0:beta1
cpe:/a:opera:opera_browser:6.0:beta2
cpe:/a:opera:opera_browser:6.0:beta3
cpe:/a:opera:opera_browser:6.0:tp1
cpe:/a:opera:opera_browser:6.0:tp2
cpe:/a:opera:opera_browser:6.0:tp3
cpe:/a:opera:opera_browser:6.1
cpe:/a:opera:opera_browser:6.11
cpe:/a:opera:opera_browser:6.12
cpe:/a:opera:opera_browser:6.1:beta1
cpe:/a:opera:opera_browser:7.0
cpe:/a:opera:opera_browser:7.01
cpe:/a:opera:opera_browser:7.02
cpe:/a:opera:opera_browser:7.03
cpe:/a:opera:opera_browser:7.0:beta1
cpe:/a:opera:opera_browser:7.0:beta1_v2
cpe:/a:opera:opera_browser:7.0:beta2
cpe:/a:opera:opera_browser:7.10
cpe:/a:opera:opera_browser:7.10:beta1
cpe:/a:opera:opera_browser:7.11
cpe:/a:opera:opera_browser:7.11:beta2
cpe:/a:opera:opera_browser:7.20
cpe:/a:opera:opera_browser:7.20:beta7
cpe:/a:opera:opera_browser:7.21
cpe:/a:opera:opera_browser:7.22
cpe:/a:opera:opera_browser:7.23
cpe:/a:opera:opera_browser:7.50
cpe:/a:opera:opera_browser:7.50:beta1
cpe:/a:opera:opera_browser:7.51
cpe:/a:opera:opera_browser:7.52
cpe:/a:opera:opera_browser:7.53
cpe:/a:opera:opera_browser:7.54
cpe:/a:opera:opera_browser:7.54:update1
cpe:/a:opera:opera_browser:7.54:update2
cpe:/a:opera:opera_browser:7.60
cpe:/a:opera:opera_browser:8.0
cpe:/a:opera:opera_browser:8.00
cpe:/a:opera:opera_browser:8.01
cpe:/a:opera:opera_browser:8.02
cpe:/a:opera:opera_browser:8.0:beta1
cpe:/a:opera:opera_browser:8.0:beta2
cpe:/a:opera:opera_browser:8.0:beta3
cpe:/a:opera:opera_browser:8.50
cpe:/a:opera:opera_browser:8.51
cpe:/a:opera:opera_browser:8.52
cpe:/a:opera:opera_browser:8.53
cpe:/a:opera:opera_browser:8.54
cpe:/a:opera:opera_browser:9.0
cpe:/a:opera:opera_browser:9.00
cpe:/a:opera:opera_browser:9.01
cpe:/a:opera:opera_browser:9.02
cpe:/a:opera:opera_browser:9.0:beta1
cpe:/a:opera:opera_browser:9.0:beta2
cpe:/a:opera:opera_browser:9.10
cpe:/a:opera:opera_browser:9.12
cpe:/a:opera:opera_browser:9.20
cpe:/a:opera:opera_browser:9.20:beta1
cpe:/a:opera:opera_browser:9.21
cpe:/a:opera:opera_browser:9.22
cpe:/a:opera:opera_browser:9.23
cpe:/a:opera:opera_browser:9.24
cpe:/a:opera:opera_browser:9.25
cpe:/a:opera:opera_browser:9.26
cpe:/a:opera:opera_browser:9.27
cpe:/a:opera:opera_browser:9.50
cpe:/a:opera:opera_browser:9.50:beta1
cpe:/a:opera:opera_browser:9.50:beta2
cpe:/a:opera:opera_browser:9.51
cpe:/a:opera:opera_browser:9.52
cpe:/a:opera:opera_browser:9.60
cpe:/a:opera:opera_browser:9.60:beta1
cpe:/a:opera:opera_browser:9.61
cpe:/a:opera:opera_browser:9.62
cpe:/a:opera:opera_browser:9.63
cpe:/a:opera:opera_browser:9.64
cpe:/o:apple:mac_os_x
cpe:/o:microsoft:windows
cpe:/o:unix:unix
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

Alternatives




References
BID 40973




CONFIRM http://www.opera.com/support/search/view/961/




CONFIRM http://www.opera.com/docs/changelogs/windows/1054/




CONFIRM http://www.opera.com/docs/changelogs/unix/1060/




CONFIRM http://www.opera.com/docs/changelogs/mac/1054/




SECUNIA 40250




VUPEN ADV-2010-1673




VUPEN ADV-2010-1529




Vulnerability Type Permissions, Privileges, and Access Control (CWE-264)





Copyright © 2010 JPCERT/CC All Rights Reserved.