CVE-2006-1834 (CNNVD-200604-297)
中文标题:
Opera Web浏览器样式表属性缓冲区溢出漏洞
英文标题:
Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via ...
漏洞描述
中文描述:
Opera是挪威欧朋(Opera Software)公司所开发的一款Web浏览器,它支持多窗口浏览、可定制用户界面等。 Opera实现上存在有符号型变量处理漏洞,远程攻击者可能利用此漏洞导致客户机上的Opera程序崩溃。 Opera在wcsncpy调用中存在有符号型变量比较错误,攻击者可以覆盖目标缓冲区后的大量内存,导致Opera崩溃。但很难利用这个漏洞执行任意代码,因为尽管拷贝了大量的内存,但只有很少的部分是可控的。 攻击者可以通过在样式表属性中指定超长的值来触发这个漏洞。以下是有漏洞函数的反汇编。请注意如果arg_length > 0x7FFFFFFF的话,就可以绕过在0x67B8CF0D的有符号型比较。 .text:67B8CEFE ; int __stdcall POC_CALL_TO_WCSNCPY_67B8CEFE(wchar_t *,int) .text:67B8CEFE POC_CALL_TO_WCSNCPY_67B8CEFE proc near ; CODE XREF: sub_67B4DB72+9D6 p .text:67B8CEFE ; _POC_CALL_WSCNCPY_67B8AE6E+1B4 p .text:67B8CEFE .text:67B8CEFE arg_pbuf_src= dword ptr 4.text:67B8CEFE arg_length= dword ptr 8 .text:67B8CEFE .text:67B8CEFE mov eax, POC_pbuf_target .text:67B8CF03 push ebx .text:67B8CF04 push esi .text:67B8CF05 push edi .text:67B8CF06 mov edi, [esp+0Ch+arg_length] .text:67B8CF0A mov esi, [eax+40h] .text:67B8CF0D cmp edi, 4096 .text:67B8CF13 mov ebx, ecx .text:67B8CF15 jl short loc_67B8CF1C ; signedness error .text:67B8CF17 mov edi, 4095 .text:67B8CF1C .text:67B8CF1C loc_67B8CF1C: ; CODE XREF: POC_CALL_TO_WCSNCPY_67B8CEFE+17 j .text:67B8CF1C push edi ; size_t .text:67B8CF1D push [esp+10h+arg_pbuf_src] ; wchar_t * .text:67B8CF21 push esi ; wchar_t * .text:67B8CF22 call _wcsncpy .text:67B8CF27 and word ptr [esi+edi*2], 0 .text:67B8CF2C add esp, 0Ch .text:67B8CF2F mov ecx, ebx .text:67B8CF31 push esi ; wchar_t * .text:67B8CF32 call sub_67B8CD10 .text:67B8CF37 test ax, ax .text:67B8CF3A jge short loc_67B8CF48 .text:67B8CF3C mov ecx, [ebx+5D0h] .text:67B8CF42 call sub_67B8C7BC .text:67B8CF47 inc eax .text:67B8CF48 .text:67B8CF48 loc_67B8CF48: ; CODE XREF: POC_CALL_TO_WCSNCPY_67B8CEFE+3C j .text:67B8CF48 pop edi .text:67B8CF49 pop esi .text:67B8CF4A pop ebx .text:67B8CF4B retn 8 .text:67B8CF4B POC_CALL_TO_WCSNCPY_67B8CEFE endp 尽管传送2GB的字符串看起来是不可能的,但由于在调用函数中的另一个漏洞,只需注入32k字符串就可扩展为很大的负值。 .text:67B8AF62 loc_67B8AF62: ; CODE XREF: _POC_CALL_WSCNCPY_67B8AE6E+E2 j .text:67B8AF62 movsx eax, [ebp+var_length_ovfl] ; here the error occurs: short int length is sign extended .text:67B8AF62 ; to a long integer. the result is a large negative value if length .text:67B8AF62 ; is negative. .text:67B8AF66 jmp short loc_67B8AF5D
英文描述:
Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| opera | opera_browser | * | - | - |
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
|
| opera | opera_browser | 1.00 | - | - |
cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*
|
| opera | opera_browser | 2.00 | - | - |
cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*
|
| opera | opera_browser | 2.10 | - | - |
cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*
|
| opera | opera_browser | 2.12 | - | - |
cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.00 | - | - |
cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.10 | - | - |
cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.21 | - | - |
cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.50 | - | - |
cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.51 | - | - |
cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.60 | - | - |
cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.61 | - | - |
cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*
|
| opera | opera_browser | 3.62 | - | - |
cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*
|
| opera | opera_browser | 4.00 | - | - |
cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*
|
| opera | opera_browser | 4.01 | - | - |
cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*
|
| opera | opera_browser | 4.02 | - | - |
cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*
|
| opera | opera_browser | 5.0 | - | - |
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
|
| opera | opera_browser | 5.02 | - | - |
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
|
| opera | opera_browser | 5.10 | - | - |
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
|
| opera | opera_browser | 5.11 | - | - |
cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
|
| opera | opera_browser | 5.12 | - | - |
cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.0 | - | - |
cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.1 | - | - |
cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.01 | - | - |
cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.02 | - | - |
cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.03 | - | - |
cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.04 | - | - |
cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.05 | - | - |
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.06 | - | - |
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.11 | - | - |
cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
|
| opera | opera_browser | 6.12 | - | - |
cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.0 | - | - |
cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.01 | - | - |
cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.02 | - | - |
cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.03 | - | - |
cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.10 | - | - |
cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.11 | - | - |
cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.20 | - | - |
cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.21 | - | - |
cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.22 | - | - |
cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.23 | - | - |
cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.50 | - | - |
cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.51 | - | - |
cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.52 | - | - |
cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.53 | - | - |
cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.54 | - | - |
cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
|
| opera | opera_browser | 7.60 | - | - |
cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
|
| opera | opera_browser | 8.0 | - | - |
cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
|
| opera | opera_browser | 8.01 | - | - |
cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
|
| opera | opera_browser | 8.02 | - | - |
cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
|
| opera | opera_browser | 8.50 | - | - |
cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
|
| opera | opera_browser | 8.51 | - | - |
cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
|
| opera | opera_browser | 8.52 | - | - |
cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:H/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-1834 |
2025-11-11 15:17:41 | 2025-11-11 07:32:33 |
| NVD | nvd_CVE-2006-1834 |
2025-11-11 14:51:48 | 2025-11-11 07:41:18 |
| CNNVD | cnnvd_CNNVD-200604-297 |
2025-11-11 15:08:50 | 2025-11-11 07:49:06 |
| EXPLOITDB | exploitdb_EDB-27641 |
2025-11-11 15:05:24 | 2025-11-11 08:23:41 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 11 -> 14
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 数字错误
- cnnvd_id: 未提取 -> CNNVD-200604-297
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.1
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:H/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 53
- data_sources: ['cve'] -> ['cve', 'nvd']