Korean
<< Back
VID 28700
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of Opera web browser which is older than version 9.20 has been installed on the host. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 9.20 are vulnerable to two issues. The first issue allows a remote attacker to conduct cross-site scripting (XSS) attacks via the UTF-7 character set. The second issue allows a remote attacker to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.opera.com/support/search/view/855/
http://www.securityfocus.com/archive/1/archive/1/461076/100/0/threaded
http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf
http://www.hardened-php.net/advisory_032007.142.html
http://www.frsirt.com/english/advisories/2007/0745
http://www.frsirt.com/english/advisories/2007/1075
http://secunia.com/advisories/24312

* Platforms Affected:
Opera Software, Opera versions prior to 9.20
Any operating system Any version
Recommendation Upgrade to the latest version of Opera (9.20 or later), available from the Opera Web site at http://www.opera.com/download/
Related URL CVE-2007-1115,CVE-2007-1563 (CVE)
Related URL 22701,23089 (SecurityFocus)
Related URL 32722,33119 (ISS)