Vulnerability Details : CVE-2006-3198
Integer overflow in Opera 8.54 and earlier allows remote attackers to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-3198
- cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3198
44.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3198
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-3198
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3198
-
http://securityreason.com/securityalert/1133
Third Party Advisory
-
http://securitytracker.com/id?1016362
Broken Link;Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2006/2491
Broken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27318
Third Party Advisory;VDB Entry
-
http://www.vigilantminds.com/advi_detail.php?id=45
Broken Link;Vendor Advisory
-
http://www.novell.com/linux/security/advisories/2006_38_opera.html
Broken Link
-
http://www.securityfocus.com/bid/18594
Broken Link;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/archive/1/438074/100/0/threaded
Broken Link;Third Party Advisory;VDB Entry
Jump to