Opera < 22 Multiple Chromium Vulnerabilities

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote host contains a web browser that is affected by multiple
vulnerabilities.

Description :

The version of Opera installed on the remote host is prior to version
22. It is, therefore, reportedly affected by multiple vulnerabilities
in the bundled version of Chromium :

- Use-after-free errors exist related to 'styles' and
'SVG' handling. (CVE-2014-1743, CVE-2014-1745)

- An integer overflow error exists related to audio
handling. (CVE-2014-1744)

- An out-of-bounds read error exists related to media
filters. (CVE-2014-1746)

- A user-input validation error exists related to
handling local MHTML files that could allow
for universal cross-site scripting (UXSS) attacks.
(CVE-2014-1747)

- An unspecified error exists related to the scrollbar
that could allow UI spoofing. (CVE-2014-1748)

- Various unspecified errors. (CVE-2014-1749)

- An integer underflow error exists related to the V8
JavaScript engine that could allow a denial of service
condition. (CVE-2014-3152)

- An error exists related to the 'Blick' 'SpeechInput'
feature that could allow click-jacking and information
disclosure. (CVE-2014-3803)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

http://blogs.opera.com/desktop/changelog22/
http://www.nessus.org/u?2da726ba
http://www.opera.com/docs/changelogs/unified/2200/

Solution :

Upgrade to Opera 22 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now