First published: Sat Sep 27 2008(Updated: )
Opera before 9.52 on Windows, Linux, FreeBSD, and Solaris, when processing custom shortcut and menu commands, can produce argument strings that contain uninitialized memory, which might allow user-assisted remote attackers to execute arbitrary code or conduct other attacks via vectors related to activation of a shortcut.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Opera | <9.52 | |
Any of | ||
FreeBSD FreeBSD | ||
Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris and Zettabyte File System (ZFS) | ||
Opera | <=9.51 | |
FreeBSD FreeBSD | ||
Linux | ||
Microsoft Windows | ||
Oracle Solaris and Zettabyte File System (ZFS) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4197 is considered to have a medium severity level due to the potential for remote code execution.
To fix CVE-2008-4197, upgrade Opera to version 9.52 or later.
CVE-2008-4197 affects Opera versions prior to 9.52, specifically versions up to 9.51.
CVE-2008-4197 impacts Opera on Windows, Linux, FreeBSD, and Solaris.
Yes, CVE-2008-4197 can allow remote attackers to execute arbitrary code, which may lead to data compromises.