Opera < 11.51 Multiple Vulnerabilities (BEAST)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is affected by multiple
vulnerabilities.

Description :

The version of Opera installed on the remote Windows host is prior to
11.51. It is, therefore, affected by multiple vulnerabilities :

- An unspecified error can allow an insecure or malicious
site to cause the browser to display security
information belonging to another, secure site in the
address bar. This causes the insecure or malicious site
to appear to be part of, or secured by, a third-party
site. (CVE-2011-3388)

- An information disclosure vulnerability, known as BEAST,
exists in the SSL 3.0 and TLS 1.0 protocols due to a
flaw in the way the initialization vector (IV) is
selected when operating in cipher-block chaining (CBC)
modes. A man-in-the-middle attacker can exploit this
to obtain plaintext HTTP header data, by using a
blockwise chosen-boundary attack (BCBA) on an HTTPS
session, in conjunction with JavaScript code that uses
the HTML5 WebSocket API, the Java URLConnection API,
or the Silverlight WebClient API. (CVE-2011-3389)

See also :

http://www.opera.com/support/kb/view/1000/
http://www.opera.com/docs/changelogs/windows/1151/
https://www.imperialviolet.org/2011/09/23/chromeandbeast.html
https://www.openssl.org/~bodo/tls-cbc.txt

Solution :

Upgrade to Opera 11.51 or later.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 56042 ()

Bugtraq ID: 49388
49978

CVE ID: CVE-2011-3388
CVE-2011-3389

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now