CVE-2005-2405
CVSS5.0
发布时间 :2005-08-01 00:00:00
修订时间 :2011-03-07 21:24:25
NMCO    

[原文]Opera 8.01, when the "Arial Unicode MS" font (ARIALUNI.TTF) is installed, does not properly handle extended ASCII characters in the file download dialog box, which allows remote attackers to spoof file extensions and possibly trick users into executing arbitrary code.


[CNNVD]Opera 任意代码执行漏洞 (CNNVD-200508-005)

        当安装"Arial Unicode MS"字体(ARIALUNI.TTF)时,Opera 8.01版本不能正确地处理文件下载对话框中的扩展ASCII字符。这使得远程攻击者可以通过文件扩展名进行欺骗,并且可能诱骗用户执行任意的代码。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2405
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2405
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-005
(官方数据源) CNNVD

- 其它链接及资源

http://www.opera.com/linux/changelogs/802/
(PATCH)  CONFIRM  http://www.opera.com/linux/changelogs/802/
http://secunia.com/advisories/15870
(VENDOR_ADVISORY)  SECUNIA  15870
http://www.vupen.com/english/advisories/2005/1251
(UNKNOWN)  VUPEN  ADV-2005-1251
http://xforce.iss.net/xforce/xfdb/21784
(UNKNOWN)  XF  opera-content-disposition-extension-spoofing(21784)
http://www.securityfocus.com/bid/14402
(UNKNOWN)  BID  14402
http://securitytracker.com/id?1014592
(UNKNOWN)  SECTRACK  1014592

- 漏洞信息

Opera 任意代码执行漏洞
中危 设计错误
2005-08-01 00:00:00 2005-10-20 00:00:00
远程  
        当安装"Arial Unicode MS"字体(ARIALUNI.TTF)时,Opera 8.01版本不能正确地处理文件下载对话框中的扩展ASCII字符。这使得远程攻击者可以通过文件扩展名进行欺骗,并且可能诱骗用户执行任意的代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Opera Software Opera Web Browser 8.0 1
        Opera Software Opera 8.02
        http://www.opera.com/download/
        Opera Software Opera Web Browser 8.0
        Opera Software Opera 8.02
        http://www.opera.com/download/

- 漏洞信息

18468
Opera Extended ASCII Codes Processing Download Dialog File Extension Spoofing
Other
Upgrade
Exploit Private Vendor Verified, Coordinated Disclosure

- 漏洞描述

Opera browser contains a flaw related to the handling of extended ASCII codes in download dialogs. The issue is triggered when a remote attacker provides a specially crafted "Content-Disposition" HTTP header and allows spoofing file extensions in download dialogs.

- 时间线

2005-07-28 2005-06-29
Unknow Unknow

- 解决方案

Upgrade to version 8.02 or higher, as it has been reported to fix this vulnerability. It is also possible to temporarily work around the flaw by implementing the following workaround: Remove "Arial Unicode MS" font (ARIALUNI.TTF) if installed.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站