FreeBSD : opera -- download dialog spoofing vulnerability (a2aa24fd-00d4-11da-bc08-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Secunia Advisory reports :

Secunia Research has discovered a vulnerability in Opera, which can be
exploited by malicious people to trick users into executing malicious
files.

The vulnerability is caused due to an error in the handling of
extended ASCII codes in the download dialog. This can be exploited to
spoof the file extension in the file download dialog via a specially
crafted 'Content-Disposition' HTTP header.

Successful exploitation may result in users being tricked into
executing a malicious file via the download dialog, but requires that
the 'Arial Unicode MS' font (ARIALUNI.TTF) has been installed on the
system.

See also :

http://www.opera.com/freebsd/changelogs/802/
http://www.nessus.org/u?b359fdaa

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19353 (freebsd_pkg_a2aa24fd00d411dabc080001020eed82.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now