Use-after-free vulnerability in the BitTorrent support in Opera before 9.22 allows user-assisted remote attackers to execute arbitrary code via a crafted header in a torrent file, which leaves a dangling pointer to an invalid object.
References
Link | Resource |
---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=564 | Broken Link Vendor Advisory |
http://www.opera.com/support/search/view/862/ | Broken Link Patch Vendor Advisory |
http://secunia.com/advisories/26138 | Broken Link Patch |
http://security.gentoo.org/glsa/glsa-200708-17.xml | Third Party Advisory |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | Broken Link |
http://www.securityfocus.com/bid/24970 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1018431 | Broken Link Third Party Advisory VDB Entry |
http://secunia.com/advisories/26545 | Broken Link |
http://www.vupen.com/english/advisories/2007/2584 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35509 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2007-07-20 17:30
Updated : 2022-02-25 19:59
NVD link : CVE-2007-3929
Mitre link : CVE-2007-3929
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
opera
- opera_browser