Vulnerability Details : CVE-2011-0682
Integer truncation error in opera.dll in Opera before 11.01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML form with a select element that contains a large number of children.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2011-0682
- cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-0682
4.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-0682
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2011-0682
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0682
-
http://www.opera.com/docs/changelogs/mac/1101/
How can we help you? - Opera Help
-
http://www.opera.com/docs/changelogs/unix/1101/
How can we help you? - Opera Help
-
http://www.opera.com/support/kb/view/982/
Welcome - Opera Security CornerVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0231
Webmail | OVH- OVHVendor Advisory
-
http://www.securityfocus.com/bid/46036
Opera Web Browser Multiple Security Vulnerabilities
-
https://www.alternativ-testing.fr/blog/index.php?post/2011/[CVE-XXXX-XXXX]-Opera-11-Integer-Truncation-Vulnerability
Jordi Chancel Security Research Blog – Recherche et Exploitation de Vulnérabilités des Navigateurs Web
-
http://www.opera.com/docs/changelogs/windows/1101/
How can we help you? - Opera Help
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12636
Repository / Oval Repository
Jump to