FreeBSD : opera -- 'data:' URI handler spoofing vulnerability (20c9bb14-81e6-11d9-a9e7-0001020eed82)

medium Nessus Plugin ID 18865

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A Secunia Advisory reports :

Michael Holzt has discovered a vulnerability in Opera, which can be exploited by malicious people to trick users into executing malicious files.

The vulnerability is caused due to an error in the processing of 'data:' URIs, causing wrong information to be shown in a download dialog. This can be exploited by e.g. a malicious website to trick users into executing a malicious file by supplying a specially crafted 'data:' URI.

Solution

Update the affected packages.

See Also

https://blogs.opera.com/desktop/

http://www.nessus.org/u?32df5a2a

Plugin Details

Severity: Medium

ID: 18865

File Name: freebsd_pkg_20c9bb1481e611d9a9e70001020eed82.nasl

Version: 1.19

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-opera, p-cpe:/a:freebsd:freebsd:opera, p-cpe:/a:freebsd:freebsd:opera-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/18/2005

Vulnerability Publication Date: 1/12/2005

Reference Information

CVE: CVE-2005-0456

CERT: 882926

Secunia: 13818