Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Opera web browser URI obfuscation


Vulnerability Assessment Details

Opera web browser URI obfuscation

Vulnerability Assessment Summary
Check version of Opera for URI obfuscation bug

Detailed Explanation for this Vulnerability Assessment

The version of Opera installed on the remote host is vulnerable to a
flaw wherein a remote attacker can obscure the URI, leading the user
to believe that he/she is accessing a trusted resource.

To exploit this issue, a possible hacker would need to set up a rogue web
site, then entice a local user to visit the site. Successful
exploitation would enable the attacker to execute arbitrary code on
this host.

See also : http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html
Solution : Install Opera 7.54 or newer

Network Security Threat Level: High

Networks Security ID: 10810, 10517

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 Tenable Network Security

Cables, Connectors

Apple Macbook Pro Computer Intel Core i5 - 13.3'' Display - 4GB Memory MD101LL/A
$310.0
Apple Macbook Pro Computer Intel Core i5 - 13.3'' Display - 4GB Memory MD101LL/A pictureORICO Portable Colorful USB3.0 Memory Card Reader for TF Card Reader Best Price
$0.99
ORICO Portable Colorful USB3.0 Memory Card Reader for TF Card Reader Best Price picturedesktop memory
$40.0
desktop memory pictureSKhynix 4GB DIMM DDR3 Desktop PC3-12800 12800 1600MHz 1600 240-pin Ram Memory
$13.95
SKhynix 4GB DIMM DDR3 Desktop PC3-12800 12800 1600MHz 1600 240-pin Ram Memory picture


Discussions

No Discussions have been posted on this vulnerability.