| VID |
28633 |
| Severity |
30 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Opera on the host, according to its version number, allows an attacker to spoof the address bar. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera version 7.53 Build 3850 and earlier running on Microsoft Windows could allow a remote attacker to spoof a trusted Web page by altering the URL that is displayed in the address bar. A remote attacker could construct a hostile Web site that contains HTML code that uses the window.open and location.replace functions to spoof a trusted Web site, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked. This would allow the attacker to trick the user into visiting the spoofed Web page and possibly obtain sensitive information.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html http://www.osvdb.org/displayvuln.php?osvdb_id=8317 http://packetstormsecurity.nl/0407-exploits/bitlanceOpera.txt
* Platforms Affected: Opera 7.53 Build 3850 and earlier Linux Any version Windows Any version |
| Recommendation |
Upgrade to the latest version of Opera (7.54 or later), available from the Opera Web site at http://www.opera.com/download/ |
| Related URL |
(CVE) |
| Related URL |
10810 (SecurityFocus) |
| Related URL |
16816 (ISS) |
|