| VID |
28636 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Opera Web browser, according to its version number, has a file download extension spoofing vulnerability. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 7.50 could allow a remote attacker to trick a user into running arbitrary code. This vulnerability involves specifying the CLSID for HTML applications in the name of a malicious file, followed by another file name and extension. The issue is triggered when a malicious web site provides a file for download, but crafts the filename in such a way that the file is executed, rather than saved. A remote attacker could construct a hostile Web site that contains a malicious script exploiting this vulnerability, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=3917
* Platforms Affected: Opera versions prior to 7.50 Linux Any version Windows Any version |
| Recommendation |
Upgrade to the latest version of Opera (7.50 or later), available from the Opera Web site at http://www.opera.com/download/ |
| Related URL |
(CVE) |
| Related URL |
9640 (SecurityFocus) |
| Related URL |
(ISS) |
|