VID |
28673 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Opera web browser which is older than version 8.54 has been installed on the host. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 8.54 are vulnerable to a buffer overflow vulnerability when processing an overly long CSS (Cascading Style Sheets) attribute (e.g. "font-family"), which could be exploited by remote attackers to execute arbitrary commands via a specially crafted web page. A remote attacker could construct a hostile Web site that contains a malicious script exploiting this vulnerability, which would be executed in the victim's Web browser within the security context of the hosting site, once the malicious link is clicked.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.securityfocus.com/archive/1/430876/30/0/threaded http://www.opera.com/docs/changelogs/windows/854/ http://www.frsirt.com/english/advisories/2006/1354 http://www.sec-consult.com/259.html
* Platforms Affected: Opera Software, Opera versions prior to 8.54 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Opera (8.54 or later), available from the Opera Web site at http://www.opera.com/download/ |
Related URL |
CVE-2006-1834 (CVE) |
Related URL |
17513 (SecurityFocus) |
Related URL |
(ISS) |
|