Opera 10.6 update addresses DLL vulnerability
Nearly one month after the previous update arrived, Opera Software has issued version 10.62 of its Opera web browser, a security and stability update that addresses a high severity vulnerability. According to the developers, the latest stable release addresses a DLL security issue that has affected a number of applications on Windows systems, many of which have already published updates such as VLC and uTorrent.
The problem is a programming error which can result in applications executing malicious code in specially crafted DLL files when, for example, a user opens a file on a network drive. Under certain circumstances the installed application could subsequently load libraries containing malicious code from this network directory. Other changes include various user interface fixes, display and scripting updates, and mail, news and chat changes on all systems. The developers advise all users to upgrade.
More details about the browser update can be found in a post on the Opera Blog and in the change logs (Windows, Mac OS X, Unix). Opera 10.62 is available to download for Windows, Mac OS X and Linux from the company's site. Those who already have Opera installed can use the built-in update function.
As previously reported, the 10.6x branch will be the last release with support for the processor PowerPC architecture. According to Opera Developer Daniel Aleksandersen, the company is dropping support for the processor technology as only 0.1% of Opera users still use PowerPC-based systems.
See also:
- Malicious DLL files can be unintentionally loaded and allowed to run arbitrary code, security advisory from Opera.
(crve)