Opera < 12.15 Multiple Vulnerabilities

critical Nessus Plugin ID 65927

Synopsis

The remote host contains a web browser that is affected by multiple vulnerabilities.

Description

The version of Opera installed on the remote host is earlier than 12.15 and therefore is reportedly affected by the following vulnerabilities :

- A weakness exists in the RC4 encryption protocol, allowing an attacker to derive the plaintext. (1046)

- A weakness exists due to the application allowing cookies to be set for top-level domains, potentially exposing the cookie to the entire top-level domain. A malicious site could redirect the user to another website within the same top-level domain causing it to reuse its cookie. (1047)

- An unspecified, moderate severity issue exists that has an unspecified impact.

Solution

Upgrade to Opera 12.15 or later.

See Also

http://web.archive.org/web/20180219151916/http://www.opera.com/security/advisory/1046

http://web.archive.org/web/20170202083335/http://www.opera.com/security/advisory/1047

http://www.opera.com/docs/changelogs/unified/1215/

Plugin Details

Severity: Critical

ID: 65927

File Name: opera_1215.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 4/11/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-3211

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Required KB Items: SMB/Opera/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/4/2013

Vulnerability Publication Date: 4/4/2013

Reference Information

CVE: CVE-2013-3210, CVE-2013-3211

BID: 58864, 59317