Opera < 9.63 Multiple Vulnerabilities

High Nessus Plugin ID 35185


The remote host contains a web browser that is affected by several issues.


The version of Opera installed on the remote host is earlier than 9.63 and thus reportedly affected by several issues :

- It may be possible to execute arbitrary code on the remote system by manipulating certain text-area contents. (920)

- It may be possible to crash the remote browser using certain HTML constructs or inject code under certain conditions. (921)

- It may be possible to trigger a buffer overflow, and potentially execute arbitrary code, by tricking an user to click on a URL that contains exceptionally long host names. (922)

- While previewing news feeds, Opera does not correctly block certain scripted URLs. Such scripts, if not blocked, may be able to subscribe a user to other arbitrary feeds and view contents of the feeds to which the user is currently subscribed. (923)

- By displaying content using XSLT as escaped strings, it may be possible for a website to inject scripted markup. (924)

- SSL server certificates are not properly validated due to an unspecified error. (CVE-2012-1251)


Upgrade to Opera 9.63 or later.

See Also








Plugin Details

Severity: High

ID: 35185

File Name: opera_963.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Family: Windows

Published: 2008/12/16

Modified: 2013/06/04

Dependencies: 21746

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Required KB Items: SMB/Opera/Version

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2008-5178, CVE-2012-1251

BID: 32323, 32864, 32891

OSVDB: 49882, 82726

CWE: 119