Opera < 10.63 Multiple Vulnerabilities

High Nessus Plugin ID 49964


The remote host contains a web browser that is affected by multiple vulnerabilities.


The version of Opera installed on the remote host is prior to 10.63.
It is, therefore, affected by the multiple vulnerabilities :

- It is possible to bypass cross-domain checks and allow partial data theft by using CSS. (971)

- It is possible to spoof the page address by modifying the size of the browser window. (972)

- Carefully timed reloads and redirects allow spoofing and cross-site scripting attacks. Using this XSS vector i may be possible to modify Opera's configuration, which could allow arbitrary code execution on the remote system. (973)

- It is possible to intercept private video streams.

- An error while displaying invalid URLs allows cross-site scripting attacks. (976)

- It's possible to crash the application and cause a denial of service condition when saving a file while the page redirects, when viewing a Flash movie with a transparent Window Mode (wmode) property, or when SVG exists in an '<img>' element.


Upgrade to Opera 10.63 or later.

See Also








Plugin Details

Severity: High

ID: 49964

File Name: opera_1063.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2010/10/13

Modified: 2015/04/07

Dependencies: 21746

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Required KB Items: SMB/Opera/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/10/12

Vulnerability Publication Date: 2010/09/13

Reference Information

CVE: CVE-2010-4043, CVE-2010-4044, CVE-2010-4045, CVE-2010-4046, CVE-2010-4047, CVE-2010-4048, CVE-2010-4049, CVE-2010-4050

BID: 43607, 43920, 73570, 73680

OSVDB: 68826, 68827, 68828, 68829, 68830, 68831, 68832, 68833

MSVR: MSVR11-002

Secunia: 41740