Opera patches 7 bugs but keeps one secret
Hints that other software remains at risk from a cross-site scripting vulnerability
Computerworld - Opera Software ASA today patched seven vulnerabilities in its flagship Opera browser, but it declined to provide information about one of the bugs.
The Oslo-based browser developer hinted that other programs, not yet unpatched, were also affected by the flaw.
Today's update to Opera 9.52 fixes multiple bugs -- seven in the Windows version, five in the Mac edition and six in the Linux browser -- that range from "extremely severe" to "not severe" in the company's five-step threat-ranking system.
What was unusual, however, was that Opera omitted an explanation for one of the fixed flaws. Instead, the company simply stated in the change log: "Fixed an issue that could allow cross-site scripting, as reported by Chris Weber of Casaba Security; details will be disclosed at a later date."
When asked for more information on the cross-site scripting vulnerability, Opera spokesman Thomas Ford hinted that other software might be involved. "Opera thinks it is acceptable under specific circumstances to release a security update without publishing an advisory for the specific bug," said Ford in an e-mail response to questions. "If we publish without an advisory, it is often because other vendors have not issued patches."
Other vendors have occasionally refused to provide details on what they've patched, even though they customarily publish that information simultaneously with a fix. Last February, for example, when Adobe Systems Inc. updated its popular Reader PDF utility to quash "a number of ... security vulnerabilities," it did not provide any information on the bugs it found and fixed. At the time, the behavior puzzled security researchers, who noted that Adobe was usually more forthcoming.
Adobe waited three months to publish advisories that outlined eight different vulnerabilities, prompting some experts to speculate that the company believed the severity of the bugs justified the secrecy.
However, Ford said that Opera had different motives for its secrecy. "Publishing a full advisory only because we've patched something could leave users of other products unprotected while giving malicious hackers the information needed to cause damage," he said.
The cross-site scripting vulnerability was patched for the Windows, Mac and Linux versions of Opera.
Chris Weber, the researcher at Redmond, Wash.-based Casaba Security LLC whom Opera credited with reporting the bug, did not respond to a call for comment.
Opera also fixed a protocol-handler flaw rated "extremely severe" in Windows, spoofing bugs and a vulnerability in the browser's custom shortcuts feature that could let attackers inject malicious code into the Windows, Linux, FreeBSD and Solaris versions.
The 9.52 update also addressed numerous nonsecurity bugs in the user interface, the Opera e-mail and chat clients, and other components. It also included stability and reliability improvements that fixed problems using the browser to reach Google Inc.'s Gmail online e-mail service and a memory leak in Opera's BitTorrent code.
Opera 9.52 can be downloaded from the Opera site.
Read more about Security in Computerworld's Security Topic Center.
- The Pivotal Big Data Suite- Reducing the Risks of Big Data The explosion of big data and the rapid evolution of big data tools and technologies is challenging IT to meet the demands of...
- A Survival Guide for Data in the Wild All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices...
- Transforming Security: Designing a State-of-the-Art Extended Team The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!