Vulnerability Details : CVE-2006-1834
Potential exploit
Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings.
Vulnerability category: Execute code
Products affected by CVE-2006-1834
- cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1834
15.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1834
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
CWE ids for CVE-2006-1834
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1834
-
http://security.gentoo.org/glsa/glsa-200606-01.xml
-
http://marc.info/?l=full-disclosure&m=114493114031891&w=2
-
http://securitytracker.com/id?1015912
Exploit
-
http://www.securityfocus.com/archive/1/430876/100/0/threaded
-
http://secunia.com/advisories/20117
About Secunia Research | Flexera
-
http://www.securityfocus.com/bid/17513
Exploit;Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25829
-
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
Object not found!
-
http://www.vupen.com/english/advisories/2006/1354
-
http://www.opera.com/docs/changelogs/windows/854/
-
http://www.sec-consult.com/259.html
Exploit
Jump to