Opera 9 drops DNS pins based on failed connections to irrelevant TCP ports, which makes it easier for remote attackers to conduct DNS rebinding attacks, as demonstrated by a port 81 URL in an IMG SRC, when the DNS pin had been established for a session on port 80.
                
            References
                    | Link | Resource | 
|---|---|
| http://crypto.stanford.edu/dns/dns-rebinding.pdf | Technical Description Third Party Advisory | 
| http://osvdb.org/45526 | Broken Link | 
| http://crypto.stanford.edu/dns/dns-rebinding.pdf | Technical Description Third Party Advisory | 
| http://osvdb.org/45526 | Broken Link | 
Configurations
                    History
                    21 Nov 2024, 00:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://crypto.stanford.edu/dns/dns-rebinding.pdf - Technical Description, Third Party Advisory | |
| References | () http://osvdb.org/45526 - Broken Link | 
Information
                Published : 2007-10-08 23:17
Updated : 2025-04-09 00:30
NVD link : CVE-2007-5276
Mitre link : CVE-2007-5276
CVE.ORG link : CVE-2007-5276
JSON object : View
Products Affected
                opera
- opera_browser
CWE
                