Opera < 8.54 Multiple Vulnerabilities

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is prone to a buffer
overflow attack.

Description :

The remote host is using Opera, an alternative web browser.

The version of Opera installed on the remote host contains a buffer
overflow that can be triggered by a long value within a stylesheet
attribute. Successful exploitation can lead to a browser crash and
possibly allow for the execution of arbitrary code subject to the
privileges of the user running Opera.

See also :

http://www.securityfocus.com/archive/1/430876/30/0/threaded
http://www.opera.com/docs/changelogs/windows/854/

Solution :

Upgrade to Opera 8.54 or later.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 21221 ()

Bugtraq ID: 17513

CVE ID: CVE-2006-1834

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now