Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple vulnerabilities in Opera < 8.02
Detailed Explanation for this Vulnerability Assessment
The remote host contains a web browser which is affected by multiple
The remote host is using Opera, an alternative web browser.
The version of Opera installed on the remote host contains several
flaws. One involves imaging dragging and could result in cross-site
scripting attacks and user file retrieval. A second may let attackers
spoof the file extension in the file download dialog provided the
'Arial Unicode MS' font has been installed, which is the case with
various Microsoft Office products. And a third is a design error in
the processing of mouse clicks in new browser windows that may be
exploited to trick a user into downloading and executing arbitrary
programs on the affected host.
See also :
Upgrade to Opera 8.02 or later.
Network Security Threat Level:
Medium / CVSS Base Score : 6
Networks Security ID: 14402, 14410, 15835
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security
|Dell PowerEdge R710 2x X5670 2.93GHz 6 Core 96GB 6x 1TB 7.2K SATA PERC 6/i
|Intel Xeon E5-2428L 1.8GHz (2.0GHz Turbo) 15MB 7.2GT/s SR0M3 CPU Processor
|Dell PowerEdge R720 2x E5-2620 2.0GHz 6 Core 48GB 8x 3TB 7.2K SAS H710
|Dell PowerEdge R710 2x X5570 2.93GHz Quad Core 48GB 6x 600GB 15K SAS PERC 6/i
No Discussions have been posted on this vulnerability.