Kaspersky ID:
KLA40222
Detect Date:
02/22/2023
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Opera. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Policy enforcement vulnerability in DevTools can be exploited to cause denial of service.
  2. Implementation vulnerability in Full screen mode can be exploited to cause denial of service.
  3. Use after free vulnerability in GPU can be exploited to cause denial of service or execute arbitrary code.
  4. Out of bounds read vulnerability in WebRTC can be exploited to cause denial of service.
  5. Type confusion vulnerability in DevTools can be exploited to cause denial of service.
  6. Type confusion vulnerability in Data Transfer can be exploited to cause denial of service.
  7. Implementation vulnerability in Download can be exploited to cause denial of service.
  8. Integer overflow vulnerability in Core can be exploited to cause execute arbitrary code and denial of service.
  9. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  10. Heap buffer overflow vulnerability in WebUI can be exploited to cause denial of service.

Original advisories

Related products

CVE list

  • CVE-2023-0697
    high
  • CVE-2023-0705
    critical
  • CVE-2023-0696
    critical
  • CVE-2023-0702
    critical
  • CVE-2023-0700
    high
  • CVE-2023-0698
    critical
  • CVE-2023-0701
    critical
  • CVE-2023-0703
    critical
  • CVE-2023-0704
    high
  • CVE-2023-0699
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.