This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200903-30
(Opera: Multiple vulnerabilities)
Multiple vulnerabilities were discovered in Opera:
Vitaly McLain reported a heap-based buffer overflow when processing
host names in file:// URLs (CVE-2008-5178).
Alexios Fakos reported a vulnerability in the HTML parsing engine
when processing web pages that trigger an invalid pointer calculation
and heap corruption (CVE-2008-5679).
Red XIII reported that certain text-area contents can be
manipulated to cause a buffer overlow (CVE-2008-5680).
David Bloom discovered that unspecified 'scripted URLs' are not
blocked during the feed preview (CVE-2008-5681).
Robert Swiecki of the Google Security Team reported a Cross-site
scripting vulnerability (CVE-2008-5682).
An unspecified vulnerability reveals random data
Tavis Ormandy of the Google Security Team reported a vulnerability
when processing JPEG images that may corrupt memory
A remote attacker could entice a user to open a specially crafted JPEG
image to cause a Denial of Service or execute arbitrary code, to
process an overly long file:// URL or to open a specially crafted web
page to execute arbitrary code. He could also read existing
subscriptions and force subscriptions to arbitrary feed URLs, as well
as inject arbitrary web script or HTML via built-in XSLT templates.
There is no known workaround at this time.
See also :
All Opera users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-client/opera-9.64'
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 35943 (gentoo_GLSA-200903-30.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now