How to Buy
This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200903-30
(Opera: Multiple vulnerabilities)
Multiple vulnerabilities were discovered in Opera:
Vitaly McLain reported a heap-based buffer overflow when processing
host names in file:// URLs (CVE-2008-5178).
Alexios Fakos reported a vulnerability in the HTML parsing engine
when processing web pages that trigger an invalid pointer calculation
and heap corruption (CVE-2008-5679).
Red XIII reported that certain text-area contents can be
manipulated to cause a buffer overlow (CVE-2008-5680).
David Bloom discovered that unspecified 'scripted URLs' are not
blocked during the feed preview (CVE-2008-5681).
Robert Swiecki of the Google Security Team reported a Cross-site
scripting vulnerability (CVE-2008-5682).
An unspecified vulnerability reveals random data
Tavis Ormandy of the Google Security Team reported a vulnerability
when processing JPEG images that may corrupt memory
A remote attacker could entice a user to open a specially crafted JPEG
image to cause a Denial of Service or execute arbitrary code, to
process an overly long file:// URL or to open a specially crafted web
page to execute arbitrary code. He could also read existing
subscriptions and force subscriptions to arbitrary feed URLs, as well
as inject arbitrary web script or HTML via built-in XSLT templates.
There is no known workaround at this time.
See also :
All Opera users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-client/opera-9.64'
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 35943 (gentoo_GLSA-200903-30.nasl)
CVE ID: CVE-2008-5178CVE-2008-5679CVE-2008-5680CVE-2008-5681CVE-2008-5682CVE-2008-5683CVE-2009-0914
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.