Opera sings code execution blues

Summary:The flaw can be exploited to cause a buffer overflow when a user right-clicks a malicious torrent entry in the transfer manager.

Opera Web browser
Opera has released a "highly critical" update to plug a nasty code execution hole affecting Windows users.

The vulnerability, confirmed in all Opera versions prior to 9.21 for Windows, is caused due to an error in the handling of torrent files, according to an advisory issued by the Norwegian software company.

The flaw can be exploited to cause a buffer overflow when a user right-clicks a malicious torrent entry in the transfer manager.

"Successful exploitation allows execution of arbitrary code," Opera warned, urging all Windows users to immediately update to version 9.21.

Secunia rates the bug as "highly critical" but notes that simply clicking on the dirty torrent link will not trigger the vulnerability.

Topics: Windows

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.