Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2007:009: opera


Vulnerability Assessment Details

SUSE-SA:2007:009: opera

Vulnerability Assessment Summary
Check for the version of the opera package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2007:009 (opera).


This update brings the Opera Web browser to version 9.10, including
fixes for the following 2 security problems:

- CVE-2007-0126: Opera processes a JPEG DHT marker incorrectly, which
can potentially lead to remote code execution.

- CVE-2007-0127: Opera is affected by a typecasting bug in its
Javascripts SVG implementation which could potentially be used to
execute code.


Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2007_09_opera.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Dell Precision T3500 Tower Xeon W3530 2.8 18GB 128GB SSD 2TB HDD Dual DVI Nvidia
$224.99
Dell Precision T3500 Tower Xeon W3530 2.8 18GB 128GB SSD 2TB HDD Dual DVI Nvidia pictureWD 1TB My Book Studio Edition External Hard Drive WDH1Q10000N FW800 eSATA USB2.0
$45.0
WD 1TB My Book Studio Edition External Hard Drive WDH1Q10000N FW800 eSATA USB2.0 pictureLenovo 910-27ISH All in One 27" UHD 4K Touch-Screen i7 Quad 16GB 1TB 2GB 950A
$1049.65
Lenovo 910-27ISH All in One 27ASUS ROG G752VT 17", 48GB RAM, 1T HD, 3GB VRAM, Gaming Laptop, Windows 10
$795.0
ASUS ROG G752VT 17


Discussions

No Discussions have been posted on this vulnerability.