製品・ソフトウェアに関する情報
Opera におけるサービス運用妨害 (DoS) の脆弱性
Title Opera におけるサービス運用妨害 (DoS) の脆弱性
Summary

Opera には、window.print 関数の処理に関して不備があるため、サービス運用妨害 (DoS) 状態となる脆弱性が存在します。 本問題は、CVE-2009-0821 と関連する問題です。

Possible impacts 第三者により、window.print 関数の呼び出しを介して、サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Sept. 18, 2009, midnight
Registration Date Sept. 27, 2010, 4:09 p.m.
Last Update Sept. 27, 2010, 4:09 p.m.
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
Opera Software ASA
Opera 9.52 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2010年09月27日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2008-7245
Summary

Opera 9.52 and earlier allows remote attackers to cause a denial of service (unusable browser) by calling the window.print function in a loop, aka a "printing DoS attack," possibly a related issue to CVE-2009-0821.

Publication Date Sept. 19, 2009, 7:30 a.m.
Registration Date Jan. 29, 2021, 1:52 p.m.
Last Update Oct. 12, 2018, 5:58 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* 9.52
Related information, measures and tools
Common Vulnerabilities List