| VID |
28635 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Opera Web browser, according to its version number, has a buffer overflow vulnerability in the zip process code. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 7.23 are vulnerable to a buffer overflow vulnerability, caused by insufficient bounds checking when processing the zipped skin files by Opera. This vulnerability can be exploited in combination with various security flaws, such as a directory traversal vulnerability in the Opera browser. A remote attacker could construct a hostile Web site that contains a malicious file exploiting this vulnerability, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=2854 http://www.secunia.com/advisories/10277 http://archives.neohapsis.com/archives/bugtraq/2003-11/0255.html
* Platforms Affected: Opera 7.22 and earlier Linux Any version Windows Any version |
| Recommendation |
Upgrade to the latest version of Opera (7.23 or later), available from the Opera Web site at http://www.opera.com/download/ |
| Related URL |
(CVE) |
| Related URL |
9089 (SecurityFocus) |
| Related URL |
13821 (ISS) |
|