Search This Blog

Wednesday, September 28, 2005

[NEWS] Opera Mail Client Attachment Spoofing and Script Injection

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -

Opera Mail Client Attachment Spoofing and Script Injection
------------------------------------------------------------------------

SUMMARY

" <http://www.opera.com/> Opera is a full-featured Internet power tool on
the market, Opera includes pop-up blocking, tabbed browsing, integrated
searches, E-mail, RSS Newsfeeds and IRC chat."

Lack of prover input validation allows attackers to insert arbitrary code
and execute it in Opera Mail.

DETAILS

Vulnerable Systems:
* Opera version 8.02

Immune Systems:
* Opera version 8.50

Two vulnerabilities in Opera Mai client, can be exploited by a malicious
person to conduct script insertion attacks and to spoof the name of
attached files.

1. Attached files are opened without any warnings directly from the
user's cache directory. This can be exploited to execute arbitrary
JavaScript in context of "file://".
2. Normally, filename extensions are determined by the "Content-Type" in
Opera Mail. However, by appending an additional '.' to the end of a
filename, an HTML file could be spoofed to be e.g. "image.jpg.".

The two vulnerabilities combined may be exploited to conduct script
insertion attacks if the user chooses to view an attachment named e.g.
"image.jpg." e.g. resulting in disclosure of local files.

Disclosure Timeline:
01/09/2005 - Initial vendor notification
20/09/2005 - Public disclosure

ADDITIONAL INFORMATION

The information has been provided by <mailto:vuln@secunia.com> Secunia
Research .
The original article can be found at:
<http://secunia.com/advisories/16645/>
http://secunia.com/advisories/16645/

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments: