[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060621033909.23960.qmail@securityfocus.com>
Date: 21 Jun 2006 03:39:09 -0000
From: N9@...tical.lt
To: bugtraq@...urityfocus.com
Subject: Opera 9 DoS PoC
Critical Security advisory #009 [http://www.critical.lt]
Advisory can be reached: http://www.critical.lt/?vuln/349
We are: N9, bigb0u, cybergoth, iglOo, mircia, Povilas
Shouts to Lithuanian girlz! and our friends ;]
Product: Opera 9 (8.x is immune to this)
Vuln type: Denial of Service
Risk: moderated
Attack type: Remote
Details:
Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access.
Proof Of Concept DoS exploit:
http://www.critical.lt/research/opera_die_happy.html
Research was originaly done by Povilas Tumėnas a.k.a. N9
P.S. To Opera Team, we like your browser and want it to be as good as possible.
Powered by blists - more mailing lists