Opera < 8.50 Multiple Vulnerabilities

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser which is vulnerable to
attachment spoofing, script insertion and unintentional file uploads.

Description :

The remote host is using Opera, an alternative web browser.

The installed version of Opera on the remote host contains two flaws
its mail client and one in the browser. First, message attachments
are opened from the user's cache directory without any warnings, which
can be exploited to execute arbitrary JavaScript within the context of
'file://'. Second, appending an additional '.' to an attachment's
filename causes the file type to be spoofed. And third, the browser
is affected by an unspecified drag-and-drop vulnerability that
facilitates unintentional file uploads.

See also :

http://secunia.com/secunia_research/2005-42/advisory/
http://www.opera.com/docs/changelogs/windows/850/

Solution :

Upgrade to Opera 8.50 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 19766 ()

Bugtraq ID: 14880
14884

CVE ID: CVE-2005-3006
CVE-2005-3007
CVE-2005-3041

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now