Jan 27, 2011 16:36 GMT  ·  By

Opera Software has released version 11.01 of its popular browser which addresses several vulnerabilities including a remote code execution one reported earlier this month.

The release contains fixes for a total of five security issues, one rated with low severity, one with moderate, two with high and one with critical.

The critical flaw was disclosed on January 7 by Jordi Chancel as a crash with possibility of unreliable remote code execution.

French vulnerability research company VUPEN later confirmed the vulnerability and developed a working exploit for it.

The flaw stems from an integer truncation error located in the "opera.dll" module which is triggered when handling a specially crafted "select" element.

Opera Software notes in its advisory that exploitation is not straight forward. "To inject code, additional techniques will have to be employed," it writes.

Another patch takes care of a high severity vulnerability that can be exploited to bypass the clickjacking (UI redressing) restrictions for internal "opera:" URLs.

The second highly rated fixed flaw allows attackers to elevate the privileges of a Web page through a series of HTTP responses and redirections in order to launch local files.

The moderate risk vulnerability consists of a failure to delete stored email passwords until the browser is restarted when the "Delete Private Data" option is used.

Finally, the last security hole concerns an error in how the downloads manager opens the location of downloaded files, but it is rated as low because exploitation includes a series of unlikely manual steps.

In addition to fixing the five vulnerabilities, Opera 11.01 also makes it easier for sites to filter untrusted CSS by removing support for "javascript:" URLs in CSS-o-link values. The latest version of Opera for Windows can be downloaded from here.

The latest version of Opera for Linux can be downloaded from here.

The latest version of Opera for Mac can be downloaded from here.