Korean
<< Back
VID 28635
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Opera Web browser, according to its version number, has a buffer overflow vulnerability in the zip process code. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 7.23 are vulnerable to a buffer overflow vulnerability, caused by insufficient bounds checking when processing the zipped skin files by Opera. This vulnerability can be exploited in combination with various security flaws, such as a directory traversal vulnerability in the Opera browser.
A remote attacker could construct a hostile Web site that contains a malicious file exploiting this vulnerability, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=2854
http://www.secunia.com/advisories/10277
http://archives.neohapsis.com/archives/bugtraq/2003-11/0255.html

* Platforms Affected:
Opera 7.22 and earlier
Linux Any version
Windows Any version
Recommendation Upgrade to the latest version of Opera (7.23 or later), available from the Opera Web site at http://www.opera.com/download/
Related URL (CVE)
Related URL 9089 (SecurityFocus)
Related URL 13821 (ISS)