Korean
<< Back
VID 28673
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Opera web browser which is older than version 8.54 has been installed on the host. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 8.54 are vulnerable to a buffer overflow vulnerability when processing an overly long CSS (Cascading Style Sheets) attribute (e.g. "font-family"), which could be exploited by remote attackers to execute arbitrary commands via a specially crafted web page. A remote attacker could construct a hostile Web site that contains a malicious script exploiting this vulnerability, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.securityfocus.com/archive/1/430876/30/0/threaded
http://www.opera.com/docs/changelogs/windows/854/
http://www.frsirt.com/english/advisories/2006/1354
http://www.sec-consult.com/259.html

* Platforms Affected:
Opera Software, Opera versions prior to 8.54
Any operating system Any version
Recommendation Upgrade to the latest version of Opera (8.54 or later), available from the Opera Web site at http://www.opera.com/download/
Related URL CVE-2006-1834 (CVE)
Related URL 17513 (SecurityFocus)
Related URL (ISS)