CVE-2006-1834 (CNNVD-200604-297)

MEDIUM 有利用代码
中文标题:
Opera Web浏览器样式表属性缓冲区溢出漏洞
英文标题:
Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via ...
CVSS分数: 5.1
发布时间: 2006-04-19 16:00:00
漏洞类型: 数字错误
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Opera是挪威欧朋(Opera Software)公司所开发的一款Web浏览器,它支持多窗口浏览、可定制用户界面等。 Opera实现上存在有符号型变量处理漏洞,远程攻击者可能利用此漏洞导致客户机上的Opera程序崩溃。 Opera在wcsncpy调用中存在有符号型变量比较错误,攻击者可以覆盖目标缓冲区后的大量内存,导致Opera崩溃。但很难利用这个漏洞执行任意代码,因为尽管拷贝了大量的内存,但只有很少的部分是可控的。 攻击者可以通过在样式表属性中指定超长的值来触发这个漏洞。以下是有漏洞函数的反汇编。请注意如果arg_length > 0x7FFFFFFF的话,就可以绕过在0x67B8CF0D的有符号型比较。 .text:67B8CEFE ; int __stdcall POC_CALL_TO_WCSNCPY_67B8CEFE(wchar_t *,int) .text:67B8CEFE POC_CALL_TO_WCSNCPY_67B8CEFE proc near ; CODE XREF: sub_67B4DB72+9D6 p .text:67B8CEFE ; _POC_CALL_WSCNCPY_67B8AE6E+1B4 p .text:67B8CEFE .text:67B8CEFE arg_pbuf_src= dword ptr 4.text:67B8CEFE arg_length= dword ptr 8 .text:67B8CEFE .text:67B8CEFE mov eax, POC_pbuf_target .text:67B8CF03 push ebx .text:67B8CF04 push esi .text:67B8CF05 push edi .text:67B8CF06 mov edi, [esp+0Ch+arg_length] .text:67B8CF0A mov esi, [eax+40h] .text:67B8CF0D cmp edi, 4096 .text:67B8CF13 mov ebx, ecx .text:67B8CF15 jl short loc_67B8CF1C ; signedness error .text:67B8CF17 mov edi, 4095 .text:67B8CF1C .text:67B8CF1C loc_67B8CF1C: ; CODE XREF: POC_CALL_TO_WCSNCPY_67B8CEFE+17 j .text:67B8CF1C push edi ; size_t .text:67B8CF1D push [esp+10h+arg_pbuf_src] ; wchar_t * .text:67B8CF21 push esi ; wchar_t * .text:67B8CF22 call _wcsncpy .text:67B8CF27 and word ptr [esi+edi*2], 0 .text:67B8CF2C add esp, 0Ch .text:67B8CF2F mov ecx, ebx .text:67B8CF31 push esi ; wchar_t * .text:67B8CF32 call sub_67B8CD10 .text:67B8CF37 test ax, ax .text:67B8CF3A jge short loc_67B8CF48 .text:67B8CF3C mov ecx, [ebx+5D0h] .text:67B8CF42 call sub_67B8C7BC .text:67B8CF47 inc eax .text:67B8CF48 .text:67B8CF48 loc_67B8CF48: ; CODE XREF: POC_CALL_TO_WCSNCPY_67B8CEFE+3C j .text:67B8CF48 pop edi .text:67B8CF49 pop esi .text:67B8CF4A pop ebx .text:67B8CF4B retn 8 .text:67B8CF4B POC_CALL_TO_WCSNCPY_67B8CEFE endp 尽管传送2GB的字符串看起来是不可能的,但由于在调用函数中的另一个漏洞,只需注入32k字符串就可扩展为很大的负值。 .text:67B8AF62 loc_67B8AF62: ; CODE XREF: _POC_CALL_WSCNCPY_67B8AE6E+E2 j .text:67B8AF62 movsx eax, [ebp+var_length_ovfl] ; here the error occurs: short int length is sign extended .text:67B8AF62 ; to a long integer. the result is a large negative value if length .text:67B8AF62 ; is negative. .text:67B8AF66 jmp short loc_67B8AF5D

英文描述:

Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings.

CWE类型:
CWE-189
标签:
dos linux SEC Consult OSVDB-31744
受影响产品
厂商 产品 版本 版本范围 平台 CPE
opera opera_browser * - - cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
opera opera_browser 1.00 - - cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*
opera opera_browser 2.00 - - cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*
opera opera_browser 2.10 - - cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*
opera opera_browser 2.12 - - cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*
opera opera_browser 3.00 - - cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*
opera opera_browser 3.10 - - cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*
opera opera_browser 3.21 - - cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*
opera opera_browser 3.50 - - cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*
opera opera_browser 3.51 - - cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*
opera opera_browser 3.60 - - cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*
opera opera_browser 3.61 - - cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*
opera opera_browser 3.62 - - cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*
opera opera_browser 4.00 - - cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*
opera opera_browser 4.01 - - cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*
opera opera_browser 4.02 - - cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*
opera opera_browser 5.0 - - cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
opera opera_browser 5.02 - - cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
opera opera_browser 5.10 - - cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
opera opera_browser 5.11 - - cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
opera opera_browser 5.12 - - cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
opera opera_browser 6.0 - - cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
opera opera_browser 6.1 - - cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
opera opera_browser 6.01 - - cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
opera opera_browser 6.02 - - cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
opera opera_browser 6.03 - - cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
opera opera_browser 6.04 - - cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
opera opera_browser 6.05 - - cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
opera opera_browser 6.06 - - cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
opera opera_browser 6.11 - - cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
opera opera_browser 6.12 - - cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
opera opera_browser 7.0 - - cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
opera opera_browser 7.01 - - cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
opera opera_browser 7.02 - - cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
opera opera_browser 7.03 - - cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
opera opera_browser 7.10 - - cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
opera opera_browser 7.11 - - cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
opera opera_browser 7.20 - - cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
opera opera_browser 7.21 - - cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
opera opera_browser 7.22 - - cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
opera opera_browser 7.23 - - cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
opera opera_browser 7.50 - - cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
opera opera_browser 7.51 - - cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
opera opera_browser 7.52 - - cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
opera opera_browser 7.53 - - cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
opera opera_browser 7.54 - - cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
opera opera_browser 7.60 - - cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
opera opera_browser 8.0 - - cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
opera opera_browser 8.01 - - cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
opera opera_browser 8.02 - - cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
opera opera_browser 8.50 - - cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
opera opera_browser 8.51 - - cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
opera opera_browser 8.52 - - cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
17513 vdb-entry
cve.org
访问
1015912 vdb-entry
cve.org
访问
20060413 SEC Consult SA-20060314 :: Opera Browser CSS Attribute Integer Wrap / Buffer Overflow mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
opera-wcsncpy-css-bo(25829) vdb-entry
cve.org
访问
20060413 SEC Consult SA-20060314 :: Opera Browser CSS Attribute Integer Wrap / Buffer Overflow mailing-list
cve.org
访问
GLSA-200606-01 vendor-advisory
cve.org
访问
ADV-2006-1354 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
SUSE-SR:2006:010 vendor-advisory
cve.org
访问
20117 third-party-advisory
cve.org
访问
ExploitDB EDB-27641 EXPLOIT
exploitdb
访问
Download Exploit EDB-27641 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2006-1834 ADVISORY
cve.org
访问
CVSS评分详情
5.1
MEDIUM
CVSS向量: AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-04-19 16:00:00
修改时间:
2024-08-07 17:27:29
创建时间:
2025-11-11 15:32:33
更新时间:
2026-01-19 09:42:11
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-1834 2025-11-11 15:17:41 2025-11-11 07:32:33
NVD nvd_CVE-2006-1834 2025-11-11 14:51:48 2025-11-11 07:41:18
CNNVD cnnvd_CNNVD-200604-297 2025-11-11 15:08:50 2025-11-11 07:49:06
EXPLOITDB exploitdb_EDB-27641 2025-11-11 15:05:24 2025-11-11 08:23:41
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:23:41
references_count: 11 → 14; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 11 -> 14
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:06
vulnerability_type: 未提取 → 数字错误; cnnvd_id: 未提取 → CNNVD-200604-297; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 数字错误
  • cnnvd_id: 未提取 -> CNNVD-200604-297
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:18
cvss_score: 未提取 → 5.1; cvss_vector: NOT_EXTRACTED → AV:N/AC:H/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 53; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.1
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:H/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 53
  • data_sources: ['cve'] -> ['cve', 'nvd']