blob: 506b63836f49536ccea5223071752cf81e599465 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200407-15">
<title>Opera: Multiple spoofing vulnerabilities</title>
Opera contains three vulnerabilities, allowing an attacker to impersonate
legitimate websites with URI obfuscation or to spoof websites with frame
<product type="ebuild">opera</product>
<announced>July 20, 2004</announced>
<revised>July 20, 2004: 01</revised>
<package name="www-client/opera" auto="yes" arch="*">
<unaffected range="ge">7.53</unaffected>
<vulnerable range="le">7.52</vulnerable>
Opera is a multi-platform web browser.
Opera fails to remove illegal characters from an URI of a link and to check
that the target frame of a link belongs to the same website as the link.
Opera also updates the address bar before loading a page. Additionally,
Opera contains a certificate verification problem.
<impact type="normal">
These vulnerabilities could allow an attacker to impersonate legitimate
websites to steal sensitive information from users. This could be done by
obfuscating the real URI of a link or by injecting a malicious frame into
an arbitrary frame of another browser window.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.
All Opera users should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=www-client/opera-7.53"
# emerge ">=www-client/opera-7.53"</code>
<uri link="">Bugtraq Announcement</uri>
<uri link="">Secunia Advisory SA11978</uri>
<uri link="">Secunia Advisory SA12028</uri>
<uri link="">Opera Changelog</uri>
<metadata tag="submitter">