We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Opera denies refusing to patch critical vulnerability

Opera denies refusing to patch critical vulnerability

Company were informed of an error which can lead to arbitrary code execution six months ago, but claim they couldn't replicate it

Article comments

Opera Software has released an update for its desktop browser in order to address a critical vulnerability in its handling of Scalable Vector Graphics (SVG) files, disclosed a week ago. The company denies refusing to patch the flaw when it was brought to its attention earlier this year.

Security researcher José A. Vázquez stirred controversy at the beginning of last week when he released proof-of-concept exploit code for an unpatched vulnerability in Opera.

Told them, they wouldn't fix it

Making security issues public without notifying affected vendors in advance is generally frowned upon in the security community, but is not particularly uncommon. However, in this case, the researcher claims to have tried acting responsibly without success.

"In this post, I do the release of an issue that I discovered 362 days ago and it was reported to Opera using the SSD program (SecuriTeam Secure Disclosure), but they have decided not to fix it," Vázquez said on his blog on 10 October.

The issue stems from an error in Opera's SVG handling code which can be exploited to execute arbitrary code by tricking victims into loading specially crafted SVG images with malformed fonts.

Opera admits being alerted about the flaw six months ago, as part of a larger report, but, it claims that it couldn't replicate the issue at the time. According to the vendor, its attempts to obtain more information from the researcher at the time weren't successful.

"In this case, the issue had only been confirmed for older versions of Opera, not the current version, at the time of it being reported, and the recently published information contained details that were not included in the original report, and which appear to be relevant to reproducing the issue," Opera quality assurance engineer Sigbjørn Vik said Wednesday.

SVG vulnerability is common

"With our release today of Opera 11.52, we have a fix available for this issue, less than a week after being made aware of the relevant details. [...] We recommend that all Opera users download and install this newest version," he said.

SVG handling vulnerabilities are common and most browser vendors have dealt with this type of issue at one point or another. Such flaws are usually discovered with the help of automated programs called fuzzers which feed malformed input to SVG parsers in the hope of triggering expoloitable crashes.

The latest Google Chrome stable update contained a patch for a flaw involving SVG fonts, while a critical SVG vulnerability was patched in Firefox 6.

In addition to addressing the SVG vulnerability, Opera 11.52 also contains fixes for non-security issues with BitTorrent downloads, HTML5 videos and X-Frame-Options error pages.

Share:

Comments

Advertisement
Advertisement
Send to a friend

Email this article to a friend or colleague:


PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open
* *