Opera < 10.63 Multiple Vulnerabilities

High Log Correlation Engine Plugin ID 800852

Synopsis

The remote host has a web browser that is vulnerable to multiple attack vectors.

Description

The remote host is running the Opera web browser.

Versions of Opera earlier than 10.63 are potentially affected by multiple vulnerabilities :

- It is possible to bypass cross-domain checks, and allow partial data theft by using CSS. (971)

- It is possible to spoof the page address by modifying the size of the browser window. (972)

- Carefully timed reloads and redirects could allow spoofing and cross-site scripting attacks. Using this XSS vector it may be possible to modify Opera's configuration, which could allow arbitrary code execution on the remote system. (973)

- It is possible to intercept private video streams. (974)

- An error while displaying invalid URL's could allow cross-site scripting attacks. (976)

Solution

Upgrade to Opera 10.63 or later.

See Also

http://.nessus.org/u?7d1d3543

http://.opera.com/docs/changelogs/windows/1063

http://.opera.com/support/kb/view/971

http://.opera.com/support/kb/view/972

http://.opera.com/support/kb/view/973

http://.opera.com/support/kb/view/974

http://.opera.com/support/kb/view/976

Plugin Details

Severity: High

ID: 800852

File Name: 800852.prm

Family: Web Clients

Published: 2010/10/13

Nessus ID: 49964

Risk Information

Risk Factor: High

CVSSv2

Base Score: 6.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

Patch Publication Date: 2010/10/12

Vulnerability Publication Date: 2010/09/13

Reference Information

CVE: CVE-2010-4043, CVE-2010-4044, CVE-2010-4045, CVE-2010-4046, CVE-2010-4047, CVE-2010-4048, CVE-2010-4049, CVE-2010-4050

BID: 43607, 43920