Opera < 10.63 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 800852

Synopsis

The remote host has a web browser that is vulnerable to multiple attack vectors.

Description

The remote host is running the Opera web browser.

Versions of Opera earlier than 10.63 are potentially affected by multiple vulnerabilities :

- It is possible to bypass cross-domain checks, and allow partial data theft by using CSS. (971)

- It is possible to spoof the page address by modifying the size of the browser window. (972)

- Carefully timed reloads and redirects could allow spoofing and cross-site scripting attacks. Using this XSS vector it may be possible to modify Opera's configuration, which could allow arbitrary code execution on the remote system. (973)

- It is possible to intercept private video streams. (974)

- An error while displaying invalid URL's could allow cross-site scripting attacks. (976)

Solution

Upgrade to Opera 10.63 or later.

See Also

http://.nessus.org/u?7d1d3543

http://.opera.com/docs/changelogs/windows/1063

http://.opera.com/support/kb/view/971

http://.opera.com/support/kb/view/972

http://.opera.com/support/kb/view/973

http://.opera.com/support/kb/view/974

http://.opera.com/support/kb/view/976

Plugin Details

Severity: High

ID: 800852

Family: Web Clients

Published: 10/13/2010

Nessus ID: 49964

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

Patch Publication Date: 10/12/2010

Vulnerability Publication Date: 9/13/2010

Reference Information

CVE: CVE-2010-4043, CVE-2010-4044, CVE-2010-4045, CVE-2010-4046, CVE-2010-4047, CVE-2010-4048, CVE-2010-4049, CVE-2010-4050

BID: 43607, 43920