Opera < 12.15 Multiple Vulnerabilities

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is affected by multiple
vulnerabilities.

Description :

The version of Opera installed on the remote host is earlier than 12.15
and therefore is reportedly affected by the following vulnerabilities :

- A weakness exists in the RC4 encryption protocol,
allowing an attacker to derive the plaintext. (1046)

- A weakness exists due to the application allowing
cookies to be set for top-level domains, potentially
exposing the cookie to the entire top-level domain. A
malicious site could redirect the user to another
website within the same top-level domain causing it to
reuse its cookie. (1047)

- An unspecified, moderate severity issue exists that has an
unspecified impact.

See also :

http://www.opera.com/security/advisory/1046
http://www.opera.com/security/advisory/1047
http://www.opera.com/docs/changelogs/unified/1215/

Solution :

Upgrade to Opera 12.15 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 65927 ()

Bugtraq ID: 58864
59317

CVE ID: CVE-2013-3210
CVE-2013-3211

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now