Vulnerability Description
Heap-based buffer overflow in Opera 9.62 on Windows allows remote attackers to execute arbitrary code via a long file:// URI. NOTE: this might overlap CVE-2008-5680.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opera | Opera | 9.62 |
| Microsoft | Windows | All versions |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2008-11/0110.html
- http://osvdb.org/49882
- http://secunia.com/advisories/32752Vendor Advisory
- http://secunia.com/advisories/34294
- http://security.gentoo.org/glsa/glsa-200903-30.xml
- http://www.opera.com/support/kb/view/922/
- http://www.securityfocus.com/bid/32323Exploit
- http://www.vupen.com/english/advisories/2008/3183
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46653
- https://www.exploit-db.com/exploits/7135
- http://archives.neohapsis.com/archives/bugtraq/2008-11/0110.html
- http://osvdb.org/49882
- http://secunia.com/advisories/32752Vendor Advisory
- http://secunia.com/advisories/34294
- http://security.gentoo.org/glsa/glsa-200903-30.xml
FAQ
What is CVE-2008-5178?
CVE-2008-5178 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in Opera 9.62 on Windows allows remote attackers to execute arbitrary code via a long file:// URI. NOTE: this might overlap CVE-2008-5680.
How severe is CVE-2008-5178?
CVE-2008-5178 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5178?
Check the references section above for vendor advisories and patch information. Affected products include: Opera Opera, Microsoft Windows.