Korean
<< Back
VID 28068
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Opera on the host, according to its version number, has an arbitrary file deletion vulnerability. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 7.23 build 3227 could allow a remote attacker to traverse directories and delete arbitrary files on the affected system. Opera creates a temporary file when displaying the download dialog window. The vulnerability is caused due to an input validation error during the creation of the temporary file, which allows a malicious URL to contain hexadecimal URL encoded "dot dot" sequences (in the form of ..%5c..%5c) to traverse directories on the victim's system. The file with this string can be located on any paths on the same drive as the temporary file. Successful exploitation allows a malicious website to overwrite and delete arbitrary files on a user's system with the user's privileges.

Example, which overwrites "calc.exe" on a user's system:
http://[malicious_website]/[path]/AAAAAAAAAA%5C..%5C..%5Ccalc.exe

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://opera.rainyblue.org/modules/cjaycontent/index.php?id=16
http://www.secunia.com/advisories/10425
http://www.securityfocus.com/archive/1/348278

* Platforms Affected:
Opera 7.22 and earlier
Linux Any version
Windows Any version
Recommendation Upgrade to the latest version of Opera (7.23 build 3227 or later), available from the Opera Web site at http://www.opera.com/download/
Related URL (CVE)
Related URL 9279 (SecurityFocus)
Related URL 13977 (ISS)