Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.opera.com/support/kb/view/920/
http://www.opera.com/support/kb/view/921/
http://www.opera.com/support/kb/view/922/
http://www.opera.com/support/kb/view/923/
http://www.opera.com/support/kb/view/924/
http://secunia.com/advisories/32752/
http://www.vuxml.org/freebsd/225bc349-ce10-11dd-a721-0030843d3802.html
Insight
The following packages are affected:
opera
linux-opera
CVE-2008-5178
Heap-based buffer overflow in Opera 9.62 on Windows allows remote attackers to execute arbitrary code via a long file:// URI.
Severity
Classification
-
CVE CVE-2008-5178 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities