Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:057: opera

Vulnerability Assessment Details

SUSE-SA:2005:057: opera

Vulnerability Assessment Summary
Check for the version of the opera package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:057 (opera).

This update upgrades the Opera web browser to the 8.50 release.

Besides the changes in 8.50 that are listed in
following security problems were fixed:

1. Attached files are opened without any warnings directly from the
user's cache directory. This can be exploited to execute arbitrary
Javascript in context of 'file://'.

2. Normally, filename extensions are acertaind by the 'Content-Type'
in Opera Mail. However, by appending an additional '.' to the end of
a filename, an HTML file could be spoofed to be e.g. 'image.jpg.'.

These two vulnerabilities combined may be exploited to conduct script
insertion attacks if the user chooses to view an attachment named
e.g. 'image.jpg.' e.g. resulting in disclosure of local files.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

LOT OF 6: Samsung 2GB 1Rx8 PC3-10600S-09-11-B2 Memory
LOT OF 6: Samsung 2GB 1Rx8 PC3-10600S-09-11-B2 Memory pictureSamsung SSD SM841 mSATA 256GB Model:MZ-MPD256D
Samsung SSD SM841 mSATA 256GB Model:MZ-MPD256D picture


No Discussions have been posted on this vulnerability.