Opera < 9.21 Transfer Manager Torrent File Handling Overflow

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is prone to a buffer
overflow attack.

Description :

The version of Opera installed on the remote host reportedly contains
a buffer overflow vulnerability that can be triggered by a malicious
Torrent file. Successful exploitation requires that a user on the
affected host right-click on the torrent entry in the transfer manager
rather than simply click on a torrent link and may allow a remote
attacker to execute arbitrary code subject to the privileges of the
user.

See also :

http://www.nessus.org/u?45badbe6
http://seclists.org/bugtraq/2007/May/354
http://www.opera.com/support/search/view/860/

Solution :

Upgrade to Opera version 9.21 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 25290 ()

Bugtraq ID: 24080

CVE ID: CVE-2007-2809

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now