Lucene search

K

Opera Multiple Vulnerabilities - March12 (MacOSX)

🗓️ 29 Mar 2012 00:00:00Reported by Copyright (c) 2012 SecPodType 
openvas
 openvas
🔗 plugins.openvas.org👁 16 Views

Opera Multiple Vulnerabilities - March12 (MacOSX). Successful exploitation could allow attackers to execute arbitrary code in the context of the browser, inject scripts, bypass security restrictions, conduct spoofing attacks, or cause a denial of service condition. Multiple flaws are due to an error in web page dialogs handling, history.state leak, dialog window placement, small window for the download dialog, timed page reloads, and web page content displayed outside of the intended area. The host is installed with Opera and is prone to vulnerabilities. Upgrade to Opera version 11.62 or later

Show more
Related
Refs
Code
###############################################################################
# OpenVAS Vulnerability Test
# $Id: secpod_opera_mult_vuln_mar12_macosx.nasl 5940 2017-04-12 09:02:05Z teissa $
#
# Opera Multiple Vulnerabilities - March12 (MacOSX)
#
# Authors:
# Rachana Shetty <[email protected]>
#
# Copyright:
# Copyright (c) 2012 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful exploitation could allow attackers to execute arbitrary code in
  the context of the browser, inject scripts, bypass certain security
  restrictions, conduct spoofing attacks, or cause a denial of service
  condition.
  Impact Level: System/Application";
tag_affected = "Opera version before 11.62";
tag_insight = "Multiple flaws are due to
  - An error in web page dialogs handling, which displays the wrong address in
    the address field.
  - An error in history.state, which leaks the state data from cross domain
    pages via history.pushState() and history.replaceState() functions.
  - Fails to ensure that a dialog window is placed on top of content windows,
    allows attackers to trick users into executing downloads.
  - A small window for the download dialog.
  - A timed page reloads and redirects to different domains.
  - The web page content displayed outside of the intended content area.";
tag_solution = "Upgrade to the Opera version 11.62 or later,
  For updates refer to http://www.opera.com/download/";
tag_summary = "The host is installed with Opera and is prone to multiple
  vulnerabilities.";

if(description)
{
  script_id(902667);
  script_version("$Revision: 5940 $");
  script_cve_id("CVE-2012-1924",  "CVE-2012-1925", "CVE-2012-1926", "CVE-2012-1927",
                "CVE-2012-1928", "CVE-2012-1929");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"$Date: 2017-04-12 11:02:05 +0200 (Wed, 12 Apr 2017) $");
  script_tag(name:"creation_date", value:"2012-03-29 19:43:23 +0530 (Thu, 29 Mar 2012)");
  script_name("Opera Multiple Vulnerabilities - March12 (MacOSX)");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1009/");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1010/");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1010/");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1011/");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1012/");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1013/");
  script_xref(name : "URL" , value : "http://www.opera.com/support/kb/view/1014/");
  script_xref(name : "URL" , value : "http://www.opera.com/docs/changelogs/mac/1162/");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2012 SecPod");
  script_family("General");
  script_dependencies("gb_opera_detect_macosx.nasl");
  script_require_keys("Opera/MacOSX/Version");
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("version_func.inc");

## Variable Initialization
operaVer = NULL;

operaVer = get_kb_item("Opera/MacOSX/Version");
if(!operaVer){
  exit(0);
}

# Check for operq version < 11.62
if(version_is_less(version:operaVer, test_version:"11.62")){
  security_message(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo