This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
A Secunia Advisory reports :
Secunia Research has discovered a vulnerability in Opera, which can be
exploited by malicious people to trick users into executing malicious
The vulnerability is caused due to an error in the handling of
extended ASCII codes in the download dialog. This can be exploited to
spoof the file extension in the file download dialog via a specially
crafted 'Content-Disposition' HTTP header.
Successful exploitation may result in users being tricked into
executing a malicious file via the download dialog, but requires that
the 'Arial Unicode MS' font (ARIALUNI.TTF) has been installed on the
See also :
Update the affected packages.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19353 (freebsd_pkg_a2aa24fd00d411dabc080001020eed82.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now