Vulnerability in Opera Browser (Buffer Overflow)
An Opera version 10.x browser has a highly dangerous vulnerability that could allow a remote user to compromise the target system, namely, crash the browser or execute arbitrary code on the system with the privileges of the user who launched the Opera browser.
The vulnerability is caused by a buffer overflow error as a result of an error processing HTTP responses containing a specially crafted Content-Length HTTP header. An attacker could, by sending a Content-Length value too long, cause dynamic memory overflow and, as a result, execute arbitrary code on a remote system with user privileges or crash the browser.
There are currently no solutions to the error. It is recommended that you either don’t visit unfamiliar sites through Opera 10.x, or visit, but with reduced privileges.
There is a valid exploit on the network. So be careful yourself and warn your friends / acquaintances!
Source - Opera 10.x Content-Length Buffer Overflow PoC
The vulnerability is caused by a buffer overflow error as a result of an error processing HTTP responses containing a specially crafted Content-Length HTTP header. An attacker could, by sending a Content-Length value too long, cause dynamic memory overflow and, as a result, execute arbitrary code on a remote system with user privileges or crash the browser.
There are currently no solutions to the error. It is recommended that you either don’t visit unfamiliar sites through Opera 10.x, or visit, but with reduced privileges.
There is a valid exploit on the network. So be careful yourself and warn your friends / acquaintances!
Source - Opera 10.x Content-Length Buffer Overflow PoC