Opera Web Browser up to 7.20 ArrayBuffer integer numeric error
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.3 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in Opera Web Browser up to 7.20. The impacted element is the function ArrayBuffer. Performing a manipulation of the argument integer results in numeric error.
This vulnerability is identified as CVE-2012-1003. There is not any exploit available.
Details
A vulnerability classified as problematic has been found in Opera Web Browser up to 7.20 (Web Browser). This affects the function ArrayBuffer. The manipulation of the argument integer with an unknown input leads to a numeric error vulnerability. CWE is classifying the issue as CWE-189. This is going to have an impact on availability. The summary by CVE is:
Multiple integer overflows in Opera 11.60 and earlier allow remote attackers to cause a denial of service (application crash) via a large integer argument to the (1) Int32Array, (2) Float32Array, (3) Float64Array, (4) Uint32Array, (5) Int16Array, or (6) ArrayBuffer function. NOTE: the vendor reportedly characterizes this as "a stability issue, not a security issue."
The weakness was released 02/06/2012 (Website). It is possible to read the advisory at xforce.iss.net. This vulnerability is uniquely identified as CVE-2012-1003 since 02/03/2012. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (73027) and Vulnerability Center (SBV-34623†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.opera.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 802829
OpenVAS Name: Opera Large Integer Argument Denial of Service Vulnerability (Linux)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
02/03/2012 🔍02/06/2012 🔍
02/06/2012 🔍
02/06/2012 🔍
03/13/2012 🔍
03/23/2015 🔍
04/10/2017 🔍
Sources
Vendor: opera.comAdvisory: xforce.iss.net
Status: Not defined
CVE: CVE-2012-1003 (🔍)
GCVE (CVE): GCVE-0-2012-1003
GCVE (VulDB): GCVE-100-60111
X-Force: 73027
Vulnerability Center: 34623 - Opera Multiple Integer Overflows Allow Remote DoS via Large Integer Arguments in Several Functions, Medium
Entry
Created: 03/23/2015 16:50Updated: 04/10/2017 11:43
Changes: 03/23/2015 16:50 (51), 04/10/2017 11:43 (8)
Complete: 🔍
Cache ID: 216:203:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.