The latest zero-day vulnerability in the Opera Web browser highlights the fact that all Web browser clients are insecure by nature, says security services firm Idappcom.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Haywood said the latest Opera vulnerability allows potential attackers to execute arbitrary code remotely.
The flaw was discovered by French security researcher Jordi Chancel, who disclosed it earlier this month and classified the problem as an integer truncation error.
Although Opera is relatively low-profile and has a select user base, it still represents millions of users, said Anthony Haywood, chief technology officer at Idappcom.
Opera is popular among users of smartphones and netbooks and is attractive to cybercriminals because hackers can start exploring what appears to be virgin territory as far as vulnerabilities are concerned, he said.
According to Haywood, the most important thing to realise about web browser client software is that it is designed to access a variety of websites, typically using Port 80 for regular HTTP access, and Port 443 for HTTPS access.
"With so many IP ports available, this might sound a small IP profile to deal with from a security perspective, but the problem is that there is a growing number of non-standard applications that use Port 80 across the internet, meaning that a web browser client must be able to support these features," he said.
Any software that uses Port 80 across the internet has to be viewed as a potential security issue and users, especially IT managers, need to be aware of this fact, said Haywood.
"The bottom line to this latest browser flaw is that internet software users need to install multiple layers of security defence, and ensure their software - and their security knowledge - is as up-to-date as possible," he said.