Opera < 11.60 Multiple Vulnerabilities (BEAST)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is affected by multiple
vulnerabilities.

Description :

The version of Opera installed on the remote Windows host is prior to
11.60. It is, therefore, affected by multiple vulnerabilities :

- An unspecified error exists that can allow URL
spoofing in the address bar. (CVE-2011-4010)

- Top level domain separation rules are not honored for
two-letter top level domains, e.g., '.us' or '.uk', and
some three-letter top level domains. This error can
allow sites to set the scripting context to the top
level domain. Further, this can allow sites to set and
read cookies from other sites whose scripting context is
set to the same top level domain. (CVE-2011-4681)

- An error exists in the implementation of the JavaScript
'in' operator that can allow sites to verify the
existence of variables of sites in other domains.
(CVE-2011-4682)

- An unspecified, moderately severe issue exists. Details
are to be disclosed by the vendor at a later date.
(CVE-2011-4683)

- The browser does not properly handle certain corner
cases related to certificate revocation. (CVE-2011-4684)

- Unspecified content can cause the 'Dragonfly' component
of the browser to crash. (CVE-2011-4685)

- An unspecified error exists related to the 'Web
Workers' implementation that can allow application
crashes. (CVE-2011-4686)

- An unspecified error exists that can allow remote
content to cause denial of service conditions via
resource consumption. (CVE-2011-4687)

- An information disclosure vulnerability, known as BEAST,
exists in the SSL 3.0 and TLS 1.0 protocols due to a
flaw in the way the initialization vector (IV) is
selected when operating in cipher-block chaining (CBC)
modes. A man-in-the-middle attacker can exploit this
to obtain plaintext HTTP header data, by using a
blockwise chosen-boundary attack (BCBA) on an HTTPS
session, in conjunction with JavaScript code that uses
the HTML5 WebSocket API, the Java URLConnection API,
or the Silverlight WebClient API. (CVE-2011-3389)

See also :

http://netifera.com/research/
http://www.opera.com/support/kb/view/1003/
http://www.opera.com/support/kb/view/1004/
http://www.opera.com/support/kb/view/1005/
http://www.opera.com/docs/changelogs/windows/1160/
https://www.imperialviolet.org/2011/09/23/chromeandbeast.html
https://www.openssl.org/~bodo/tls-cbc.txt

Solution :

Upgrade to Opera 11.60 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now