Opera < 7.54 Download File Type Dialog Spoofing

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.


Synopsis :

The remote host has an application that is affected by an
information disclosure vulnerability.

Description :

The version of Opera on the remote host contains a flaw that allows an
attacker to determine the existence of files and directories on the
remote host.

To exploit this flaw, an attacker would need to set up a rogue website
and lure a user of the remote host into visiting it with Opera.

See also :

http://www.greymagic.com/security/advisories/gm008-op/
http://www.opera.com/docs/changelogs/windows/754/

Solution :

Install Opera 7.54 or newer.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 14346 ()

Bugtraq ID: 10961
11883

CVE ID: CVE-2004-1490

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now