First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Opera fixes security holes in Web browser
- — 26 November, 2003 09:11
A new version of the Web browser Opera released Friday closes two security holes which could allow someone to remotely take control of a computer, and incorporates a patch for the OpenSSL (Secure Sockets Layer) protocol, according to developer Opera Software.
Versions 7 to 7.22 of the browser for Windows contain both security flaws: using them to visit a specially crafted Web page could allow someone to remotely take control of a computer. The same versions for Linux contain only one of the flaws, a buffer overflow vulnerability.
The company recommends upgrading to Version 7.23, according to a note on its Web site.
Finnish software developer Jouko Pynnönen informed Opera Software of the flaws on Nov. 12, he wrote in a message to the BugTraq mailing list on Saturday. Pynnönen has previously reported security holes in Microsoft's Internet Explorer browser and Windows Media Player applications.
Code that allows users to download and automatically install new "skins" for Opera is at the root of the problems. Skins are files which allow the appearance of an application to be modified, changing the color scheme or typeface in accordance with a particular theme.
Opera is flawed in the way it checks the validity of the name and content of such files before downloading them, according to Pynnönen. A malicious Web page can be created to exploit this flaw, allowing the Web page designer to save a file in arbitrary locations on Windows machines that use Opera to visit the page. Such a file saved into the Startup directory could be crafted to take arbitrary actions with the user's privileges the next time the machine is rebooted, such as deleting files or installing a virus.
The other flaw reported by Pynnönen is a buffer overflow vulnerability affecting Windows and Linux versions of the browser. If the user is tricked into downloading a malformed skin file, a buffer overflow condition can occur, theoretically allowing the execution of arbitrary code. Pynnönen has not found a way to exploit this flaw in practice, he wrote in his message to BugTraq.
In addition to closing these holes, Version 7.23 of Opera incorporates a patch for code that handles the OpenSSL protocol. The patch was released by OpenSSL's creators on Nov. 4, and addresses a bug which could cause the browser to crash if sent invalid data about a secure Web site's security certificate, according to an announcement on the OpenSSL Web site.