Opera Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 3153

Synopsis

The remote host may be tricked into running an executable file.

Description

The remote host is using a version of Opera that is vulnerable to a download dialog spoofing flaw. Specifically, a malicious web site operator can create downloadable files that, upon download, appear to be innocent. For example, the user may think that they are downloading and opening a text file when in fact they are running an executable.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.opera.com

Plugin Details

Severity: Medium

ID: 3153

File Name: 3153.prm

Family: Web Clients

Published: 2005/07/28

Modified: 2016/12/10

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:C

CVSSv3

Base Score: 5.6

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Reference Information

CVE: CVE-2005-2407, CVE-2005-2405, CVE-2005-2406

BID: 15835, 14402, 14410