VID |
28700 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Opera web browser which is older than version 9.20 has been installed on the host. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera versions prior to 9.20 are vulnerable to two issues. The first issue allows a remote attacker to conduct cross-site scripting (XSS) attacks via the UTF-7 character set. The second issue allows a remote attacker to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.opera.com/support/search/view/855/ http://www.securityfocus.com/archive/1/archive/1/461076/100/0/threaded http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf http://www.hardened-php.net/advisory_032007.142.html http://www.frsirt.com/english/advisories/2007/0745 http://www.frsirt.com/english/advisories/2007/1075 http://secunia.com/advisories/24312
* Platforms Affected: Opera Software, Opera versions prior to 9.20 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Opera (9.20 or later), available from the Opera Web site at http://www.opera.com/download/ |
Related URL |
CVE-2007-1115,CVE-2007-1563 (CVE) |
Related URL |
22701,23089 (SecurityFocus) |
Related URL |
32722,33119 (ISS) |
|