Opera < 7.11 Filename Extension Handling Overflow

High Nessus Network Monitor Plugin ID 1763

Synopsis

The remote host is using a vulnerable version of the Opera as a web browser.

Description

The remote host is using Opera as a web browser. The version installed has a buffer overflow in the portion of its code that handles the filename extensions of the web pages. An attacker may execute arbitrary code on this host by setting up a rogue web server which bogus file extensions containing a shell code.

Solution

Upgrade to version 7.11 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2003-04/0346.html

Plugin Details

Severity: High

ID: 1763

File Name: 1763.prm

Family: Web Clients

Published: 2004/08/20

Modified: 2016/12/06

Dependencies: 1735, 8314

Nessus ID: 11578

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:ND/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Reference Information

CVE: CVE-2003-1396

BID: 7450