ID CVE-2009-3044 Type cve Reporter NVD Modified 2017-09-18T21:29:25
Description
Opera before 10.00 does not properly handle a (1) '\0' character or (2) invalid wildcard character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
{"nessus": [{"lastseen": "2019-01-16T20:09:44", "bulletinFamily": "scanner", "description": "The version of Opera installed on the remote host is earlier than\n10.0 and thus reportedly affected by multiple issues :\n\n - Opera does not check the revocation status for\n intermediate certificates not served by the server. If\n the intermediate is revoked, this might not impact the\n security rating in Opera, and the site might be shown as\n secure. (929)\n\n - The collapsed Address bar can in some cases temporarily\n show the previous domain of the present site. (930)\n\n - Some Unicode characters are treated incorrectly which\n might cause international domain names that use them to\n be shown in the wrong format. Showing these addresses in\n Unicode instead of punycode could allow for limited\n address spoofing. (932)\n\n - The application trusts root X.509 certificates signed \n with the MD2 algorithm. (933)\n\n - Certificates which use a wild card immediately before\n the top level domain, or nulls in the domain name, may\n pass validation checks in Opera. Sites using such\n certificates may then incorrectly be presented as\n secure. (934)", "modified": "2018-11-15T00:00:00", "published": "2009-09-01T00:00:00", "id": "OPERA_1000.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=40827", "title": "Opera < 10.0 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(40827);\n script_version(\"1.11\");\n\n script_cve_id(\n \"CVE-2009-3044\",\n \"CVE-2009-3045\",\n \"CVE-2009-3046\",\n \"CVE-2009-3047\",\n \"CVE-2009-3049\"\n );\n script_bugtraq_id(36202);\n script_xref(name:\"Secunia\", value:\"36414\");\n \n script_name(english:\"Opera < 10.0 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version number of Opera\");\n\n script_set_attribute(attribute:\"synopsis\",value:\n\"The remote host contains a web browser that is affected by multiple\nissues.\"\n );\n script_set_attribute(attribute:\"description\", value:\n\"The version of Opera installed on the remote host is earlier than\n10.0 and thus reportedly affected by multiple issues :\n\n - Opera does not check the revocation status for\n intermediate certificates not served by the server. If\n the intermediate is revoked, this might not impact the\n security rating in Opera, and the site might be shown as\n secure. (929)\n\n - The collapsed Address bar can in some cases temporarily\n show the previous domain of the present site. (930)\n\n - Some Unicode characters are treated incorrectly which\n might cause international domain names that use them to\n be shown in the wrong format. Showing these addresses in\n Unicode instead of punycode could allow for limited\n address spoofing. (932)\n\n - The application trusts root X.509 certificates signed \n with the MD2 algorithm. (933)\n\n - Certificates which use a wild card immediately before\n the top level domain, or nulls in the domain name, may\n pass validation checks in Opera. Sites using such\n certificates may then incorrectly be presented as\n secure. (934)\"\n );\n\n script_set_attribute(attribute:\"see_also\",\n value:\"http://web.archive.org/web/20130225215019/http://www.opera.com/support/kb/view/929/\"\n );\n script_set_attribute(attribute:\"see_also\",\n value:\"http://web.archive.org/web/20130225215023/http://www.opera.com/support/kb/view/930/\"\n );\n script_set_attribute(attribute:\"see_also\",\n value:\"http://web.archive.org/web/20130225215026/http://www.opera.com/support/kb/view/932/\"\n );\n script_set_attribute(attribute:\"see_also\",\n value:\"http://web.archive.org/web/20130225215016/http://www.opera.com/support/kb/view/933/\"\n );\n script_set_attribute(attribute:\"see_also\",\n value:\"http://web.archive.org/web/20130225215029/http://www.opera.com/support/kb/view/934/\"\n );\n script_set_attribute(attribute:\"solution\", \n value:\"Upgrade to Opera 10.0 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(264, 310);\n script_set_attribute(attribute:\"vuln_publication_date\",\n value:\"2009/09/01\"\n );\n script_set_attribute(attribute:\"patch_publication_date\",\n value:\"2009/09/01\"\n );\n script_set_attribute(attribute:\"plugin_publication_date\",\n value:\"2009/09/01\"\n );\n script_cvs_date(\"Date: 2018/11/15 20:50:27\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"local\");\nscript_set_attribute(attribute:\"cpe\", value:\"cpe:/a:opera:opera_browser\");\nscript_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"opera_installed.nasl\");\n script_require_keys(\"SMB/Opera/Version\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\n\nversion_ui = get_kb_item(\"SMB/Opera/Version_UI\");\nversion = get_kb_item(\"SMB/Opera/Version\");\nif (isnull(version)) exit(1, \"Opera version info was not found in the registry.\");\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\nif (ver[0] < 10)\n{\n if (report_verbosity > 0 && version_ui)\n {\n report = string(\n \"\\n\",\n \"Opera \", version_ui, \" is currently installed on the remote host.\\n\"\n );\n security_warning(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_warning(port:get_kb_item(\"SMB/transport\"));\n}\nexit(0, \"The installed version of Opera is not affected\");\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-01-16T20:13:58", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-201206-03\n(Opera: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Opera. Please review\n the CVE identifiers referenced below for details.\nImpact :\n\n A remote attacker could entice a user to open a specially crafted web\n page, possibly resulting in execution of arbitrary code with the\n privileges of the process or a Denial of Service condition. A remote\n attacker may be able to: trick users into downloading and executing\n arbitrary files, bypass intended access restrictions, spoof trusted\n content, spoof URLs, bypass the Same Origin Policy, obtain sensitive\n information, force subscriptions to arbitrary feeds, bypass the popup\n blocker, bypass CSS filtering, conduct cross-site scripting attacks, or\n have other unknown impact.\n A local attacker could perform symlink attacks to overwrite arbitrary\n files with the privileges of the user running the application or possibly\n obtain sensitive information.\n A physically proximate attacker may be able to access an email account.\nWorkaround :\n\n There is no known workaround at this time.", "modified": "2018-06-29T00:00:00", "published": "2012-06-21T00:00:00", "id": "GENTOO_GLSA-201206-03.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=59631", "title": "GLSA-201206-03 : Opera: Multiple vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201206-03.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59631);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/06/29 12:01:00\");\n\n script_cve_id(\"CVE-2009-1234\", \"CVE-2009-2059\", \"CVE-2009-2063\", \"CVE-2009-2067\", \"CVE-2009-2070\", \"CVE-2009-3013\", \"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\", \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\", \"CVE-2009-3831\", \"CVE-2009-4071\", \"CVE-2009-4072\", \"CVE-2010-0653\", \"CVE-2010-1349\", \"CVE-2010-1989\", \"CVE-2010-1993\", \"CVE-2010-2121\", \"CVE-2010-2421\", \"CVE-2010-2455\", \"CVE-2010-2576\", \"CVE-2010-2658\", \"CVE-2010-2659\", \"CVE-2010-2660\", \"CVE-2010-2661\", \"CVE-2010-2662\", \"CVE-2010-2663\", \"CVE-2010-2664\", \"CVE-2010-2665\", \"CVE-2010-3019\", \"CVE-2010-3020\", \"CVE-2010-3021\", \"CVE-2010-4579\", \"CVE-2010-4580\", \"CVE-2010-4581\", \"CVE-2010-4582\", \"CVE-2010-4583\", \"CVE-2010-4584\", \"CVE-2010-4585\", \"CVE-2010-4586\", \"CVE-2011-0681\", \"CVE-2011-0682\", \"CVE-2011-0683\", \"CVE-2011-0684\", \"CVE-2011-0685\", \"CVE-2011-0686\", \"CVE-2011-0687\", \"CVE-2011-1337\", \"CVE-2011-1824\", \"CVE-2011-2609\", \"CVE-2011-2610\", \"CVE-2011-2611\", \"CVE-2011-2612\", \"CVE-2011-2613\", \"CVE-2011-2614\", \"CVE-2011-2615\", \"CVE-2011-2616\", \"CVE-2011-2617\", \"CVE-2011-2618\", \"CVE-2011-2619\", \"CVE-2011-2620\", \"CVE-2011-2621\", \"CVE-2011-2622\", \"CVE-2011-2623\", \"CVE-2011-2624\", \"CVE-2011-2625\", \"CVE-2011-2626\", \"CVE-2011-2627\", \"CVE-2011-2628\", \"CVE-2011-2629\", \"CVE-2011-2630\", \"CVE-2011-2631\", \"CVE-2011-2632\", \"CVE-2011-2633\", \"CVE-2011-2634\", \"CVE-2011-2635\", \"CVE-2011-2636\", \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\", \"CVE-2011-2641\", \"CVE-2011-3388\", \"CVE-2011-4065\", \"CVE-2011-4681\", \"CVE-2011-4682\", \"CVE-2011-4683\", \"CVE-2012-1924\", \"CVE-2012-1925\", \"CVE-2012-1926\", \"CVE-2012-1927\", \"CVE-2012-1928\", \"CVE-2012-1930\", \"CVE-2012-1931\", \"CVE-2012-3555\", \"CVE-2012-3556\", \"CVE-2012-3557\", \"CVE-2012-3558\", \"CVE-2012-3560\", \"CVE-2012-3561\");\n script_xref(name:\"GLSA\", value:\"201206-03\");\n\n script_name(english:\"GLSA-201206-03 : Opera: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201206-03\n(Opera: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Opera. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to open a specially crafted web\n page, possibly resulting in execution of arbitrary code with the\n privileges of the process or a Denial of Service condition. A remote\n attacker may be able to: trick users into downloading and executing\n arbitrary files, bypass intended access restrictions, spoof trusted\n content, spoof URLs, bypass the Same Origin Policy, obtain sensitive\n information, force subscriptions to arbitrary feeds, bypass the popup\n blocker, bypass CSS filtering, conduct cross-site scripting attacks, or\n have other unknown impact.\n A local attacker could perform symlink attacks to overwrite arbitrary\n files with the privileges of the user running the application or possibly\n obtain sensitive information.\n A physically proximate attacker may be able to access an email account.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201206-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Opera users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/opera-12.00.1467'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(16, 20, 79, 94, 264, 287, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:opera\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/opera\", unaffected:make_list(\"ge 12.00.1467\"), vulnerable:make_list(\"lt 12.00.1467\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Opera\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2018-09-24T18:21:38", "bulletinFamily": "scanner", "description": "This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.", "modified": "2018-09-22T00:00:00", "published": "2009-09-07T00:00:00", "id": "OPENVAS:1361412562310800887", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800887", "title": "Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_url_spoof_vuln_sep09_win.nasl 11554 2018-09-22 15:11:42Z cfischer $\n#\n# Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Windows)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800887\");\n script_version(\"$Revision: 11554 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-22 17:11:42 +0200 (Sat, 22 Sep 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-07 19:45:38 +0200 (Mon, 07 Sep 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\",\n \"CVE-2009-3047\", \"CVE-2009-3049\");\n script_name(\"Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Windows)\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/934/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/933/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/929/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/930/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/932/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/docs/changelogs/windows/1000/\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_opera_detect_portable_win.nasl\");\n script_mandatory_keys(\"Opera/Win/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to conduct URL spoofing, and\n bypass certain security restrictions.\");\n script_tag(name:\"affected\", value:\"Opera version prior to 10.00 on Windows.\");\n script_tag(name:\"insight\", value:\"- Opera fails to handle a '\\0' character or invalid wildcard character in a\n domain name in the subject's Common Name (CN) field of an X.509 certificate.\n\n - The Trusts root X.509 certificates signed with the MD2 algorithm, which\n makes it easier for man-in-the-middle attackers to spoof arbitrary SSL\n servers via a crafted server certificate.\n\n - Opera fails to check all intermediate X.509 certificates for revocation.\n\n - When a collapsed address bar is used, Opera does not properly update the\n domain name from the previously visited site to the currently visited site.\n\n - Opera fails to display all characters in Internationalized Domain Names\n (IDN) in the address bar.\");\n script_tag(name:\"solution\", value:\"Upgrade to Opera version 10.00\n http://www.opera.com/browser/download/\");\n script_tag(name:\"summary\", value:\"This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/Win/Version\");\nif(isnull(operaVer))\n{\n exit(0);\n}\n\nif(version_is_less(version:operaVer, test_version:\"10.00\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-02T21:14:10", "bulletinFamily": "scanner", "description": "This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.", "modified": "2016-12-29T00:00:00", "published": "2009-09-07T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=800887", "id": "OPENVAS:800887", "title": "Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_url_spoof_vuln_sep09_win.nasl 4869 2016-12-29 11:01:45Z teissa $\n#\n# Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Windows)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to conduct URL spoofing, and\n bypass certain security restrictions.\n Impact Level: Application\";\ntag_affected = \"Opera version prior to 10.00 on Windows.\";\ntag_insight = \"- Opera fails to handle a '\\0' character or invalid wildcard character in a\n domain name in the subject's Common Name (CN) field of an X.509 certificate.\n - The Trusts root X.509 certificates signed with the MD2 algorithm, which\n makes it easier for man-in-the-middle attackers to spoof arbitrary SSL\n servers via a crafted server certificate.\n - Opera fails to check all intermediate X.509 certificates for revocation.\n - When a collapsed address bar is used, Opera does not properly update the\n domain name from the previously visited site to the currently visited site.\n - Opera fails to display all characters in Internationalized Domain Names\n (IDN) in the address bar.\";\ntag_solution = \"Upgrade to Opera version 10.00\n http://www.opera.com/browser/download/\";\ntag_summary = \"This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.\";\n\nif(description)\n{\n script_id(800887);\n script_version(\"$Revision: 4869 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-29 12:01:45 +0100 (Thu, 29 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-07 19:45:38 +0200 (Mon, 07 Sep 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\",\n \"CVE-2009-3047\", \"CVE-2009-3049\");\n script_name(\"Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/934/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/933/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/929/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/930/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/932/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/docs/changelogs/windows/1000/\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_opera_detection_win_900036.nasl\");\n script_require_keys(\"Opera/Win/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/Win/Version\");\nif(isnull(operaVer))\n{\n exit(0);\n}\n\n# Check for Opera Version < 10.00\nif(version_is_less(version:operaVer, test_version:\"10.00\")){\n security_message(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-09-24T18:21:42", "bulletinFamily": "scanner", "description": "This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.", "modified": "2018-09-22T00:00:00", "published": "2009-09-07T00:00:00", "id": "OPENVAS:1361412562310800888", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800888", "title": "Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Linux)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_url_spoof_vuln_sep09_lin.nasl 11554 2018-09-22 15:11:42Z cfischer $\n#\n# Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Linux)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800888\");\n script_version(\"$Revision: 11554 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-22 17:11:42 +0200 (Sat, 22 Sep 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-07 19:45:38 +0200 (Mon, 07 Sep 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\",\n \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\");\n script_name(\"Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Linux)\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/934/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/933/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/929/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/930/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/support/kb/view/932/\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/docs/changelogs/linux/1000/\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_opera_detection_linux_900037.nasl\");\n script_mandatory_keys(\"Opera/Linux/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to conduct URL spoofing, and\n can cause Security Bypass in the victim's system.\");\n script_tag(name:\"affected\", value:\"Opera version prior to 10.00 on Linux.\");\n script_tag(name:\"insight\", value:\"- Opera fails to handle a '\\0' character or invalid wildcard character in a\n domain name in the subject's Common Name (CN) field of an X.509 certificate.\n\n - The Trusts root X.509 certificates signed with the MD2 algorithm, which\n makes it easier for man-in-the-middle attackers to spoof arbitrary SSL\n servers via a crafted server certificate.\n\n - Opera fails to check all intermediate X.509 certificates for revocation.\n\n - When a collapsed address bar is used, Opera does not properly update the\n domain name from the previously visited site to the currently visited site.\n\n - Opera fails to display all characters in Internationalized Domain Names\n (IDN) in the address bar.\");\n script_tag(name:\"solution\", value:\"Upgrade to Opera version 10.00\n http://www.opera.com/browser/download/\");\n script_tag(name:\"summary\", value:\"This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/Linux/Version\");\n\nif(isnull(operaVer))\n{\n exit(0);\n}\n\nif(version_is_less(version:operaVer, test_version:\"10.00\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-02T21:13:46", "bulletinFamily": "scanner", "description": "This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.", "modified": "2016-12-29T00:00:00", "published": "2009-09-07T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=800888", "id": "OPENVAS:800888", "title": "Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Linux)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_url_spoof_vuln_sep09_lin.nasl 4869 2016-12-29 11:01:45Z teissa $\n#\n# Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Linux)\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to conduct URL spoofing, and\n can cause Security Bypass in the victim's system.\n Impact Level: Application\";\ntag_affected = \"Opera version prior to 10.00 on Linux.\";\ntag_insight = \"- Opera fails to handle a '\\0' character or invalid wildcard character in a\n domain name in the subject's Common Name (CN) field of an X.509 certificate.\n - The Trusts root X.509 certificates signed with the MD2 algorithm, which\n makes it easier for man-in-the-middle attackers to spoof arbitrary SSL\n servers via a crafted server certificate.\n - Opera fails to check all intermediate X.509 certificates for revocation.\n - When a collapsed address bar is used, Opera does not properly update the\n domain name from the previously visited site to the currently visited site.\n - Opera fails to display all characters in Internationalized Domain Names\n (IDN) in the address bar.\";\ntag_solution = \"Upgrade to Opera version 10.00\n http://www.opera.com/browser/download/\";\ntag_summary = \"This host is installed with Opera Web Browser and is prone to\n Multiple Spoof URL vulnerabilities.\";\n\nif(description)\n{\n script_id(800888);\n script_version(\"$Revision: 4869 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-29 12:01:45 +0100 (Thu, 29 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-07 19:45:38 +0200 (Mon, 07 Sep 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\",\n \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\");\n script_name(\"Opera Multiple URL Spoofing Vulnerabilities - Sep09 (Linux)\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/934/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/933/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/929/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/930/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/support/kb/view/932/\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/docs/changelogs/linux/1000/\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_opera_detection_linux_900037.nasl\");\n script_require_keys(\"Opera/Linux/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/Linux/Version\");\n\nif(isnull(operaVer))\n{\n exit(0);\n}\n\n# Check for Opera Version < 10.00\nif(version_is_less(version:operaVer, test_version:\"10.00\")){\n security_message(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-24T12:50:36", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 201206-03.", "modified": "2017-07-07T00:00:00", "published": "2012-08-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=71547", "id": "OPENVAS:71547", "title": "Gentoo Security Advisory GLSA 201206-03 (Opera)", "type": "openvas", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities have been found in Opera, the worst of\n which allow for the execution of arbitrary code.\";\ntag_solution = \"All Opera users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/opera-12.00.1467'\n \n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201206-03\nhttp://bugs.gentoo.org/show_bug.cgi?id=264831\nhttp://bugs.gentoo.org/show_bug.cgi?id=283391\nhttp://bugs.gentoo.org/show_bug.cgi?id=290862\nhttp://bugs.gentoo.org/show_bug.cgi?id=293902\nhttp://bugs.gentoo.org/show_bug.cgi?id=294208\nhttp://bugs.gentoo.org/show_bug.cgi?id=294680\nhttp://bugs.gentoo.org/show_bug.cgi?id=308069\nhttp://bugs.gentoo.org/show_bug.cgi?id=324189\nhttp://bugs.gentoo.org/show_bug.cgi?id=325199\nhttp://bugs.gentoo.org/show_bug.cgi?id=326413\nhttp://bugs.gentoo.org/show_bug.cgi?id=332449\nhttp://bugs.gentoo.org/show_bug.cgi?id=348874\nhttp://bugs.gentoo.org/show_bug.cgi?id=352750\nhttp://bugs.gentoo.org/show_bug.cgi?id=367837\nhttp://bugs.gentoo.org/show_bug.cgi?id=373289\nhttp://bugs.gentoo.org/show_bug.cgi?id=381275\nhttp://bugs.gentoo.org/show_bug.cgi?id=386217\nhttp://bugs.gentoo.org/show_bug.cgi?id=387137\nhttp://bugs.gentoo.org/show_bug.cgi?id=393395\nhttp://bugs.gentoo.org/show_bug.cgi?id=409857\nhttp://bugs.gentoo.org/show_bug.cgi?id=415379\nhttp://bugs.gentoo.org/show_bug.cgi?id=421075\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201206-03.\";\n\n \n \nif(description)\n{\n script_id(71547);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-1234\", \"CVE-2009-2059\", \"CVE-2009-2063\", \"CVE-2009-2067\", \"CVE-2009-2070\", \"CVE-2009-3013\", \"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\", \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\", \"CVE-2009-3831\", \"CVE-2009-4071\", \"CVE-2009-4072\", \"CVE-2010-0653\", \"CVE-2010-1349\", \"CVE-2010-1989\", \"CVE-2010-1993\", \"CVE-2010-2121\", \"CVE-2010-2421\", \"CVE-2010-2455\", \"CVE-2010-2576\", \"CVE-2010-2658\", \"CVE-2010-2659\", \"CVE-2010-2660\", \"CVE-2010-2661\", \"CVE-2010-2662\", \"CVE-2010-2663\", \"CVE-2010-2664\", \"CVE-2010-2665\", \"CVE-2010-3019\", \"CVE-2010-3020\", \"CVE-2010-3021\", \"CVE-2010-4579\", \"CVE-2010-4580\", \"CVE-2010-4581\", \"CVE-2010-4582\", \"CVE-2010-4583\", \"CVE-2010-4584\", \"CVE-2010-4585\", \"CVE-2010-4586\", \"CVE-2011-0681\", \"CVE-2011-0682\", \"CVE-2011-0683\", \"CVE-2011-0684\", \"CVE-2011-0685\", \"CVE-2011-0686\", \"CVE-2011-0687\", \"CVE-2011-1337\", \"CVE-2011-1824\", \"CVE-2011-2609\", \"CVE-2011-2610\", \"CVE-2011-2611\", \"CVE-2011-2612\", \"CVE-2011-2613\", \"CVE-2011-2614\", \"CVE-2011-2615\", \"CVE-2011-2616\", \"CVE-2011-2617\", \"CVE-2011-2618\", \"CVE-2011-2619\", \"CVE-2011-2620\", \"CVE-2011-2621\", \"CVE-2011-2622\", \"CVE-2011-2623\", \"CVE-2011-2624\", \"CVE-2011-2625\", \"CVE-2011-2626\", \"CVE-2011-2627\", \"CVE-2011-2628\", \"CVE-2011-2629\", \"CVE-2011-2630\", \"CVE-2011-2631\", \"CVE-2011-2632\", \"CVE-2011-2633\", \"CVE-2011-2634\", \"CVE-2011-2635\", \"CVE-2011-2636\", \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\", \"CVE-2011-2641\", \"CVE-2011-3388\", \"CVE-2011-4065\", \"CVE-2011-4681\", \"CVE-2011-4682\", \"CVE-2011-4683\", \"CVE-2012-1924\", \"CVE-2012-1925\", \"CVE-2012-1926\", \"CVE-2012-1927\", \"CVE-2012-1928\", \"CVE-2012-1930\", \"CVE-2012-1931\", \"CVE-2012-3555\", \"CVE-2012-3556\", \"CVE-2012-3557\", \"CVE-2012-3558\", \"CVE-2012-3560\", \"CVE-2012-3561\");\n script_version(\"$Revision: 6589 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 10:27:50 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-10 03:22:53 -0400 (Fri, 10 Aug 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201206-03 (Opera)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"www-client/opera\", unaffected: make_list(\"ge 12.00.1467\"), vulnerable: make_list(\"lt 12.00.1467\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-22T16:43:15", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 201206-03.", "modified": "2018-10-12T00:00:00", "published": "2012-08-10T00:00:00", "id": "OPENVAS:136141256231071547", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231071547", "title": "Gentoo Security Advisory GLSA 201206-03 (Opera)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201206_03.nasl 11859 2018-10-12 08:53:01Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.71547\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-1234\", \"CVE-2009-2059\", \"CVE-2009-2063\", \"CVE-2009-2067\", \"CVE-2009-2070\", \"CVE-2009-3013\", \"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\", \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\", \"CVE-2009-3831\", \"CVE-2009-4071\", \"CVE-2009-4072\", \"CVE-2010-0653\", \"CVE-2010-1349\", \"CVE-2010-1989\", \"CVE-2010-1993\", \"CVE-2010-2121\", \"CVE-2010-2421\", \"CVE-2010-2455\", \"CVE-2010-2576\", \"CVE-2010-2658\", \"CVE-2010-2659\", \"CVE-2010-2660\", \"CVE-2010-2661\", \"CVE-2010-2662\", \"CVE-2010-2663\", \"CVE-2010-2664\", \"CVE-2010-2665\", \"CVE-2010-3019\", \"CVE-2010-3020\", \"CVE-2010-3021\", \"CVE-2010-4579\", \"CVE-2010-4580\", \"CVE-2010-4581\", \"CVE-2010-4582\", \"CVE-2010-4583\", \"CVE-2010-4584\", \"CVE-2010-4585\", \"CVE-2010-4586\", \"CVE-2011-0681\", \"CVE-2011-0682\", \"CVE-2011-0683\", \"CVE-2011-0684\", \"CVE-2011-0685\", \"CVE-2011-0686\", \"CVE-2011-0687\", \"CVE-2011-1337\", \"CVE-2011-1824\", \"CVE-2011-2609\", \"CVE-2011-2610\", \"CVE-2011-2611\", \"CVE-2011-2612\", \"CVE-2011-2613\", \"CVE-2011-2614\", \"CVE-2011-2615\", \"CVE-2011-2616\", \"CVE-2011-2617\", \"CVE-2011-2618\", \"CVE-2011-2619\", \"CVE-2011-2620\", \"CVE-2011-2621\", \"CVE-2011-2622\", \"CVE-2011-2623\", \"CVE-2011-2624\", \"CVE-2011-2625\", \"CVE-2011-2626\", \"CVE-2011-2627\", \"CVE-2011-2628\", \"CVE-2011-2629\", \"CVE-2011-2630\", \"CVE-2011-2631\", \"CVE-2011-2632\", \"CVE-2011-2633\", \"CVE-2011-2634\", \"CVE-2011-2635\", \"CVE-2011-2636\", \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\", \"CVE-2011-2641\", \"CVE-2011-3388\", \"CVE-2011-4065\", \"CVE-2011-4681\", \"CVE-2011-4682\", \"CVE-2011-4683\", \"CVE-2012-1924\", \"CVE-2012-1925\", \"CVE-2012-1926\", \"CVE-2012-1927\", \"CVE-2012-1928\", \"CVE-2012-1930\", \"CVE-2012-1931\", \"CVE-2012-3555\", \"CVE-2012-3556\", \"CVE-2012-3557\", \"CVE-2012-3558\", \"CVE-2012-3560\", \"CVE-2012-3561\");\n script_version(\"$Revision: 11859 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 10:53:01 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-10 03:22:53 -0400 (Fri, 10 Aug 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201206-03 (Opera)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been found in Opera, the worst of\n which allow for the execution of arbitrary code.\");\n script_tag(name:\"solution\", value:\"All Opera users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/opera-12.00.1467'\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201206-03\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=264831\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=283391\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=290862\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=293902\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=294208\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=294680\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=308069\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=324189\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=325199\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=326413\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=332449\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=348874\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=352750\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=367837\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=373289\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=381275\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=386217\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=387137\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=393395\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=409857\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=415379\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=421075\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201206-03.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"www-client/opera\", unaffected: make_list(\"ge 12.00.1467\"), vulnerable: make_list(\"lt 12.00.1467\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:54", "bulletinFamily": "unix", "description": "### Background\n\nOpera is a fast web browser that is available free of charge.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to open a specially crafted web page, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. A remote attacker may be able to: trick users into downloading and executing arbitrary files, bypass intended access restrictions, spoof trusted content, spoof URLs, bypass the Same Origin Policy, obtain sensitive information, force subscriptions to arbitrary feeds, bypass the popup blocker, bypass CSS filtering, conduct cross-site scripting attacks, or have other unknown impact. \n\nA local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application or possibly obtain sensitive information. \n\nA physically proximate attacker may be able to access an email account. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Opera users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/opera-12.00.1467\"", "modified": "2012-06-15T00:00:00", "published": "2012-06-15T00:00:00", "id": "GLSA-201206-03", "href": "https://security.gentoo.org/glsa/201206-03", "type": "gentoo", "title": "Opera: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}