|
Message-ID: <Pine.GSO.4.51.0802282054390.4080@faron.mitre.org> Date: Thu, 28 Feb 2008 20:54:52 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com Subject: Re: CVE ids for Opera 9.26 security update? ====================================================== Name: CVE-2008-1080 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080 Reference: CONFIRM:http://www.opera.com/docs/changelogs/linux/926/ Reference: CONFIRM:http://www.opera.com/support/search/view/877/ Reference: FRSIRT:ADV-2008-0622 Reference: URL:http://www.frsirt.com/english/advisories/2008/0622 Reference: SECUNIA:29029 Reference: URL:http://secunia.com/advisories/29029 Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input. ====================================================== Name: CVE-2008-1081 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081 Reference: CONFIRM:http://www.opera.com/docs/changelogs/linux/926/ Reference: CONFIRM:http://www.opera.com/support/search/view/879/ Reference: FRSIRT:ADV-2008-0622 Reference: URL:http://www.frsirt.com/english/advisories/2008/0622 Reference: SECUNIA:29029 Reference: URL:http://secunia.com/advisories/29029 Opera before 9.26 allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties. ====================================================== Name: CVE-2008-1082 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082 Reference: CONFIRM:http://www.opera.com/docs/changelogs/linux/926/ Reference: CONFIRM:http://www.opera.com/support/search/view/880/ Reference: FRSIRT:ADV-2008-0622 Reference: URL:http://www.frsirt.com/english/advisories/2008/0622 Reference: SECUNIA:29029 Reference: URL:http://secunia.com/advisories/29029 Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.