Korean
<< Back
VID 28636
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Opera Web browser, according to its version number, has a file download extension spoofing vulnerability. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 7.50 could allow a remote attacker to trick a user into running arbitrary code. This vulnerability involves specifying the CLSID for HTML applications in the name of a malicious file, followed by another file name and extension. The issue is triggered when a malicious web site provides a file for download, but crafts the filename in such a way that the file is executed, rather than saved.
A remote attacker could construct a hostile Web site that contains a malicious script exploiting this vulnerability, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=3917

* Platforms Affected:
Opera versions prior to 7.50
Linux Any version
Windows Any version
Recommendation Upgrade to the latest version of Opera (7.50 or later), available from the Opera Web site at http://www.opera.com/download/
Related URL (CVE)
Related URL 9640 (SecurityFocus)
Related URL (ISS)