Summary
The remote host is running Opera Web Browser, which is prone to multiple vulnerabilities.
Impact
Remote exploitation will allow browser to crash, can potentially execute arbitrary code, cross site scripting attacks, and can even change the address field to the address of the malicious web page to mislead a user.
Impact Level : Application
Solution
Upgrade to Opera version 9.52,
http://www.opera.com/download/
Insight
Multiple vulnerabilities exists in Opera Browser,
- Sites can change framed content on other sites
- Startup crash can allow execution of arbitrary code - Custom shortcuts can pass the wrong parameters to applications - Insecure pages can show incorrect security information - Feed links can link to local files
- Feed subscription can cause the wrong page address to be displayed
Affected
Opera Version 9.51 and prior versions on Windows (All)
References
- http://www.opera.com/docs/changelogs/windows/952/
- http://www.opera.com/support/search/view/892/
- http://www.opera.com/support/search/view/893/
- http://www.opera.com/support/search/view/894/
- http://www.opera.com/support/search/view/895/
- http://www.opera.com/support/search/view/896/
- http://www.opera.com/support/search/view/897/
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-4195 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apple Safari Webkit Multiple Vulnerabilities - June13 (Mac OS X)
- Active Perl CGI.pm 'Set-Cookie' and 'P3P' HTTP Header Injection Vulnerability (Win)
- Adobe Reader Multiple Vulnerabilities - Aug07 (Mac OS X)
- Adobe Reader Cross-Site Scripting & Denial of Service Vulnerabilities (Linux)
- Apache Tomcat Multiple Vulnerabilities-01 (Nov14)