Opera < 10.63 Multiple Vulnerabilities

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is affected by multiple
vulnerabilities.

Description :

The version of Opera installed on the remote host is prior to 10.63.
It is, therefore, affected by the multiple vulnerabilities :

- It is possible to bypass cross-domain checks and allow
partial data theft by using CSS. (971)

- It is possible to spoof the page address by modifying
the size of the browser window. (972)

- Carefully timed reloads and redirects allow spoofing and
cross-site scripting attacks. Using this XSS vector i
may be possible to modify Opera's configuration, which
could allow arbitrary code execution on the remote
system. (973)

- It is possible to intercept private video streams.
(974)

- An error while displaying invalid URLs allows cross-site
scripting attacks. (976)

- It's possible to crash the application and cause a
denial of service condition when saving a file while the
page redirects, when viewing a Flash movie with a
transparent Window Mode (wmode) property, or when SVG
exists in an '<img>' element.

See also :

http://www.nessus.org/u?7d1d3543
http://www.opera.com/docs/changelogs/windows/1063/
http://www.opera.com/support/kb/view/971/
http://www.opera.com/support/kb/view/972/
http://www.opera.com/support/kb/view/973/
http://www.opera.com/support/kb/view/974/
http://www.opera.com/support/kb/view/976/

Solution :

Upgrade to Opera 10.63 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.9
(CVSS2#E:U/RL:U/RC:ND)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now