How to Buy
This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200408-05
(Opera: Multiple new vulnerabilities)
Multiple vulnerabilities have been found in the Opera web browser.
Opera fails to deny write access to the 'location' browser object. An
attacker can overwrite methods in this object and gain script access to
any page that uses one of these methods. Furthermore, access to file://
URLs is possible even from pages loaded using other protocols. Finally,
spoofing a legitimate web page is still possible, despite the fixes
announced in GLSA 200407-15.
By enticing an user to visit specially crafted web pages, an attacker
can read files located on the victim's file system, read emails written
or received by M2, Opera's mail program, steal cookies, spoof URLs,
track user browsing history, etc.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.
See also :
All Opera users should upgrade to the latest stable version:
# emerge sync
# emerge -pv '>=www-client/opera-7.54'
# emerge '>=www-client/opera-7.54'
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 14561 (gentoo_GLSA-200408-05.nasl)
CVE ID: CVE-2004-2570
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.