Opera < 7.11 Filename Extension Handling Overflow

critical Nessus Network Monitor Plugin ID 1763

Synopsis

The remote host is using a vulnerable version of the Opera as a web browser.

Description

The remote host is using Opera as a web browser. The version installed has a buffer overflow in the portion of its code that handles the filename extensions of the web pages. An attacker may execute arbitrary code on this host by setting up a rogue web server which bogus file extensions containing a shell code.

Solution

Upgrade to version 7.11 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2003-04/0346.html

Plugin Details

Severity: Critical

ID: 1763

Family: Web Clients

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 11578

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Reference Information

CVE: CVE-2003-1396

BID: 7450