Opera < 11.52 Multiple Vulnerabilities

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is affected by multiple
vulnerabilities.

Description :

The version of Opera installed on the remote Windows host is prior to
11.52. It is, therefore, affected by multiple vulnerabilities :

- An unspecified use-after-free error exists due to
improper validation of user-supplied input. A remote
attacker can exploit this, via a specially crafted web
page, to dereference already freed memory, resulting in
a crash of the browser. (CVE-2011-4152)

- An error exists related to the handling of certain font
manipulations inside dynamically added or specifically
embedded SVG images or SVG content in nested frames. A
remote attacker can exploit this to crash the
application or execute arbitrary code.
(BID 50044 / Issue #1002)

- Multiple unspecified errors exist that allow an attacker
to cause a stack overflow condition, resulting in a
browser crash.

See also :

http://www.nessus.org/u?89f357a0
http://www.opera.com/docs/changelogs/windows/1152/
http://www.nessus.org/u?c1a34bd3
http://downloads.securityfocus.com/vulnerabilities/exploits/50044.rb

Solution :

Upgrade to Opera 11.52 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 56585 ()

Bugtraq ID: 50044
50320

CVE ID: CVE-2011-4152

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now