The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Opera Web browser

computer vulnerability bulletin CVE-2017-7000

SQLite: information disclosure via Pointer Disclosure

Synthesis of the vulnerability

Impacted products: Mac OS X, Debian, Fedora, Chrome, openSUSE Leap, Opera, RHEL, SQLite, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: data reading.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 16/08/2017.
Identifiers: 1475207, CVE-2017-7000, DSA-3926-1, FEDORA-2017-571e659c85, FEDORA-2017-5f2b220c7c, FEDORA-2017-c708c044e3, FEDORA-2017-f79ae2b96f, HT207797, openSUSE-SU-2017:1993-1, openSUSE-SU-2017:1994-1, RHSA-2017:1833-01, VIGILANCE-VUL-23528.

Description of the vulnerability

An attacker can bypass access restrictions to data via Pointer Disclosure of SQLite, in order to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2017-9417

Broadcom BCM43xx: code execution via Wi-Fi

Synthesis of the vulnerability

Impacted products: iOS by Apple, iPhone, Mac OS X, Debian, Fedora, Android OS, Chrome, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Opera.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: radio connection.
Confidence: confirmed by the editor (5/5).
Creation date: 20/07/2017.
Identifiers: APPLE-SA-2017-07-19-1, APPLE-SA-2017-07-19-2, Broadpwn, CERTFR-2017-AVI-244, CVE-2017-9417, DLA-1573-1, FEDORA-2017-355ac8a91a, FEDORA-2017-a253644369, HT207922, VIGILANCE-VUL-23300.

Description of the vulnerability

An attacker can use a vulnerability via Wi-Fi of Broadcom BCM43xx, in order to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2016-5203 CVE-2016-5204 CVE-2016-5205

Chrome: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Chrome.
Impacted products: Debian, Fedora, Chrome, openSUSE, openSUSE Leap, Opera, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, client access/rights, data reading, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 02/12/2016.
Revisions dates: 01/02/2017, 15/06/2017.
Identifiers: 1000, 994, CERTFR-2016-AVI-394, CVE-2016-5203, CVE-2016-5204, CVE-2016-5205, CVE-2016-5206, CVE-2016-5207, CVE-2016-5208, CVE-2016-5209, CVE-2016-5210, CVE-2016-5211, CVE-2016-5212, CVE-2016-5213, CVE-2016-5214, CVE-2016-5215, CVE-2016-5216, CVE-2016-5217, CVE-2016-5218, CVE-2016-5219, CVE-2016-5220, CVE-2016-5221, CVE-2016-5222, CVE-2016-5223, CVE-2016-5224, CVE-2016-5225, CVE-2016-5226, CVE-2016-9650, CVE-2016-9651, CVE-2016-9652, DSA-3731-1, FEDORA-2016-a815b7bf5d, FEDORA-2016-e0e1cb2b2b, FEDORA-2017-98bed96d12, FEDORA-2017-ae1fde5fb8, openSUSE-SU-2016:3108-1, openSUSE-SU-2017:0434-1, openSUSE-SU-2017:0563-1, openSUSE-SU-2017:0565-1, RHSA-2016:2919-01, USN-3153-1, VIGILANCE-VUL-21255.

Description of the vulnerability

Several vulnerabilities were announced in Chrome.

An attacker can bypass security features via V8, in order to obtain sensitive information. [severity:3/4; CVE-2016-9651]

An attacker can trigger a Cross Site Scripting via Blink, in order to run JavaScript code in the context of the web site. [severity:3/4; CVE-2016-5208]

An attacker can trigger a Cross Site Scripting via Blink, in order to run JavaScript code in the context of the web site. [severity:3/4; CVE-2016-5207]

An attacker can bypass the origin check via PDFium, in order to access to victim's data. [severity:3/4; CVE-2016-5206]

An attacker can trigger a Cross Site Scripting via Blink, in order to run JavaScript code in the context of the web site. [severity:3/4; CVE-2016-5205]

An attacker can trigger a Cross Site Scripting via Blink, in order to run JavaScript code in the context of the web site. [severity:3/4; CVE-2016-5204]

An attacker can generate a buffer overflow via Blink, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-5209]

An attacker can force the usage of a freed memory area via PDFium, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-5203]

An attacker can generate a buffer overflow via PDFium, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-5210]

An attacker can bypass security features via DevTools, in order to obtain sensitive information. [severity:3/4; CVE-2016-5212]

An attacker can force the usage of a freed memory area via PDFium, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-5211]

An attacker can force the usage of a freed memory area via V8, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-5213]

An attacker can bypass security features via File Download, in order to obtain sensitive information. [severity:2/4; CVE-2016-5214]

An attacker can force the usage of a freed memory area via PDFium, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-5216]

An attacker can force the usage of a freed memory area via Webaudio, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-5215]

An attacker can generate a memory corruption via PDFium, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-5217]

An attacker can alter displayed information via Omnibox, in order to deceive the victim. [severity:2/4; CVE-2016-5218]

An attacker can force the usage of a freed memory area via V8, in order to trigger a denial of service, and possibly to run code (VIGILANCE-VUL-21621). [severity:2/4; CVE-2016-5219]

An attacker can generate an integer overflow via ANGLE, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-5221]

An attacker can bypass file access restrictions via PDFium, in order to obtain sensitive information. [severity:2/4; CVE-2016-5220]

An attacker can alter displayed information via Omnibox, in order to deceive the victim. [severity:2/4; CVE-2016-5222]

An attacker can bypass security features via CSP Referrer, in order to obtain sensitive information. [severity:1/4; CVE-2016-9650]

An attacker can generate an integer overflow via PDFium, in order to trigger a denial of service, and possibly to run code. [severity:1/4; CVE-2016-5223]

An attacker can trigger a Cross Site Scripting via Blink, in order to run JavaScript code in the context of the web site. [severity:1/4; CVE-2016-5226]

An attacker can bypass security features via Blink, in order to obtain sensitive information. [severity:1/4; CVE-2016-5225]

An attacker can bypass the origin check via SVG, in order to access to victim's data. [severity:1/4; CVE-2016-5224]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-9652]

An unknown vulnerability was announced via HTMLKeygenElement::shadowSelect(). [severity:2/4; 994]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2017-5070 CVE-2017-5071 CVE-2017-5072

Google Chrome: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Google Chrome.
Impacted products: Fedora, Chrome, openSUSE Leap, Opera, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 3/4.
Consequences: user access/rights, data reading, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 06/06/2017.
Identifiers: 1232, CERTFR-2017-AVI-168, CVE-2017-5070, CVE-2017-5071, CVE-2017-5072, CVE-2017-5073, CVE-2017-5074, CVE-2017-5075, CVE-2017-5076, CVE-2017-5077, CVE-2017-5078, CVE-2017-5079, CVE-2017-5080, CVE-2017-5081, CVE-2017-5082, CVE-2017-5083, CVE-2017-5085, CVE-2017-5086, FEDORA-2017-1e34da27f3, FEDORA-2017-a66e2c5b62, FEDORA-2017-a7a488d8d0, FEDORA-2017-b8d76bef4e, openSUSE-SU-2017:1501-1, openSUSE-SU-2017:1502-1, RHSA-2017:1399-01, VIGILANCE-VUL-22905.

Description of the vulnerability

An attacker can use several vulnerabilities of Chrome.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2017-5068

Chrome: information disclosure via WebRTC Race

Synthesis of the vulnerability

Impacted products: Fedora, Chrome, openSUSE Leap, Opera, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 3/4.
Consequences: data reading.
Provenance: internet server.
Confidence: confirmed by the editor (5/5).
Creation date: 03/05/2017.
Identifiers: CERTFR-2017-AVI-138, CVE-2017-5068, FEDORA-2017-7d698eba8b, FEDORA-2017-811133dc2c, FEDORA-2017-dc7ce3b314, openSUSE-SU-2017:1190-1, openSUSE-SU-2017:1194-1, RHSA-2017:1228-01, VIGILANCE-VUL-22637.

Description of the vulnerability

An attacker can bypass access restrictions to data via WebRTC Race of Chrome, in order to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2017-5057 CVE-2017-5058 CVE-2017-5059

Chrome: multiple vulnerabilities

Synthesis of the vulnerability

Impacted products: Fedora, Chrome, openSUSE Leap, Opera, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 4/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 20/04/2017.
Revision date: 03/05/2017.
Identifiers: CERTFR-2017-AVI-123, CVE-2017-5057, CVE-2017-5058, CVE-2017-5059, CVE-2017-5060, CVE-2017-5061, CVE-2017-5062, CVE-2017-5063, CVE-2017-5064, CVE-2017-5065, CVE-2017-5066, CVE-2017-5067, CVE-2017-5069, FEDORA-2017-7d698eba8b, FEDORA-2017-811133dc2c, FEDORA-2017-dc7ce3b314, openSUSE-SU-2017:1098-1, openSUSE-SU-2017:1100-1, RHSA-2017:1124-01, VIGILANCE-VUL-22520, ZDI-17-314.

Description of the vulnerability

An attacker can use several vulnerabilities of Chrome.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2017-5090

Chrome, Firefox: site spoofing via homographs

Synthesis of the vulnerability

An attacker can use a url with Unicode characters looking like ASCII characters, in order to deceive the victim.
Impacted products: Chrome, Firefox, SeaMonkey, Opera.
Severity: 2/4.
Consequences: data reading.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 18/04/2017.
Identifiers: 1332714, CVE-2017-5090, VIGILANCE-VUL-22467.

Description of the vulnerability

Several Unicode characters (such as U+0430) look like the ASCII 'a' character. Some attackers use domain names containing these variants, in order to invite the victim to click on a link.

This type of attack, based on homographs, was already described in several bulletins (VIGILANCE-VUL-4729 and VIGILANCE-VUL-8497). Fixes are applied in most software.

However, when the name is only composed of Unicode characters, the Chrome and Firefox protections are bypassed. For example, https://xn--e1awd7f.com/ is displayed as https://www.epic.com/. Moreover, as a valid certificate for this domain can be obtained via Let's Encrypt, an attacker can easily spoof a TLS site.

An attacker can therefore use a url with Unicode characters looking like ASCII characters, in order to deceive the victim.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2016-5129

v8: memory corruption via Left-trimmed Objects

Synthesis of the vulnerability

Impacted products: Debian, Android OS, Chrome, openSUSE, openSUSE Leap, Opera, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 04/04/2017.
Identifiers: CVE-2016-5129, DSA-3637-1, openSUSE-SU-2016:1865-1, openSUSE-SU-2016:1868-1, openSUSE-SU-2016:1869-1, openSUSE-SU-2016:1918-1, openSUSE-SU-2016:2320-1, RHSA-2016:1485-01, USN-3041-1, VIGILANCE-VUL-22316.

Description of the vulnerability

An attacker can generate a memory corruption via Left-trimmed Objects of v8, in order to trigger a denial of service, and possibly to run code.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2017-5052 CVE-2017-5053 CVE-2017-5054

Chrome: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Chrome.
Impacted products: Fedora, Chrome, openSUSE Leap, Opera, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 4/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 30/03/2017.
Identifiers: CERTFR-2017-AVI-095, CVE-2017-5052, CVE-2017-5053, CVE-2017-5054, CVE-2017-5055, CVE-2017-5056, FEDORA-2017-5b199bf121, FEDORA-2017-ff6940bf63, openSUSE-SU-2017:0908-1, openSUSE-SU-2017:0909-1, RHSA-2017:0860-01, VIGILANCE-VUL-22291.

Description of the vulnerability

Several vulnerabilities were announced in Chrome.

An attacker can force the usage of a freed memory area via Printing, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-5055]

An attacker can generate a buffer overflow via V8, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2017-5054]

An attacker can generate a memory corruption via Blink, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2017-5052]

An attacker can force the usage of a freed memory area via Blink, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2017-5056]

An attacker can force a read at an invalid address via V8, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2017-5053]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2016-5139

OpenJPEG: buffer overflow via opj_tcd_init_tile

Synthesis of the vulnerability

Impacted products: Debian, Fedora, Chrome, openSUSE Leap, Opera, RHEL, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 20/03/2017.
Identifiers: CVE-2016-5139, DLA-1433-1, DSA-3645-1, FEDORA-2016-e9798eaaa3, FEDORA-2017-920b27e8f4, openSUSE-SU-2016:2320-1, RHSA-2016:1580-01, RHSA-2017:0559-01, RHSA-2017:0838-01, USN-3058-1, VIGILANCE-VUL-22174.

Description of the vulnerability

An attacker can generate a buffer overflow via opj_tcd_init_tile() of OpenJPEG, in order to trigger a denial of service, and possibly to run code.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Opera Web browser: