FreeBSD : opera -- download dialog spoofing vulnerability (a2aa24fd-00d4-11da-bc08-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

A Secunia Advisory reports :

Secunia Research has discovered a vulnerability in Opera, which can be
exploited by malicious people to trick users into executing malicious

The vulnerability is caused due to an error in the handling of
extended ASCII codes in the download dialog. This can be exploited to
spoof the file extension in the file download dialog via a specially
crafted 'Content-Disposition' HTTP header.

Successful exploitation may result in users being tricked into
executing a malicious file via the download dialog, but requires that
the 'Arial Unicode MS' font (ARIALUNI.TTF) has been installed on the

See also :

Solution :

Update the affected packages.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19353 (freebsd_pkg_a2aa24fd00d411dabc080001020eed82.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now