Executive Summary

Informations
Name CVE-2008-5178 First vendor Publication 2008-11-20
Vendor Cve Last vendor Modification 2017-10-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in Opera 9.62 on Windows allows remote attackers to execute arbitrary code via a long file:// URI. NOTE: this might overlap CVE-2008-5680.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5178

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

SAINT Exploits

Description Link
Opera file URI buffer overflow More info here

OpenVAS Exploits

Date Description
2009-03-20 Name : Gentoo Security Advisory GLSA 200903-30 (opera)
File : nvt/glsa_200903_30.nasl
2008-12-23 Name : FreeBSD Ports: opera, linux-opera
File : nvt/freebsd_opera15.nasl
2008-11-21 Name : Opera Web Browser Heap Based Buffer Overflow Vulnerability (Win)
File : nvt/gb_opera_file_heap_bof_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
49882 Opera on Windows file:// URI Handling Overflow

Snort® IPS/IDS

Date Description
2014-01-10 Opera file URI handling buffer overflow
RuleID : 18597 - Revision : 9 - Type : BROWSER-OTHER
2014-01-10 Opera file URI handling buffer overflow
RuleID : 17725 - Revision : 11 - Type : BROWSER-OTHER

Nessus® Vulnerability Scanner

Date Description
2009-03-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200903-30.nasl - Type : ACT_GATHER_INFO
2008-12-21 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_225bc349ce1011dda7210030843d3802.nasl - Type : ACT_GATHER_INFO
2008-12-16 Name : The remote host contains a web browser that is affected by several issues.
File : opera_963.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/32323
BUGTRAQ http://archives.neohapsis.com/archives/bugtraq/2008-11/0110.html
CONFIRM http://www.opera.com/support/kb/view/922/
EXPLOIT-DB https://www.exploit-db.com/exploits/7135
GENTOO http://security.gentoo.org/glsa/glsa-200903-30.xml
OSVDB http://osvdb.org/49882
SECUNIA http://secunia.com/advisories/32752
http://secunia.com/advisories/34294
VUPEN http://www.vupen.com/english/advisories/2008/3183
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/46653

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2020-05-23 00:22:36
  • Multiple Updates
2017-10-19 09:23:58
  • Multiple Updates
2017-08-08 09:24:31
  • Multiple Updates
2016-06-28 17:21:12
  • Multiple Updates
2016-04-26 18:03:07
  • Multiple Updates
2014-02-17 10:47:20
  • Multiple Updates
2014-01-19 21:25:26
  • Multiple Updates
2013-05-11 00:30:55
  • Multiple Updates