Opera < 9.21 Transfer Manager Torrent File Handling Overflow

high Nessus Plugin ID 25290

Synopsis

The remote host contains a web browser that is prone to a buffer overflow attack.

Description

The version of Opera installed on the remote host reportedly contains a buffer overflow vulnerability that can be triggered by a malicious Torrent file. Successful exploitation requires that a user on the affected host right-click on the torrent entry in the transfer manager rather than simply click on a torrent link and may allow a remote attacker to execute arbitrary code subject to the privileges of the user.

Solution

Upgrade to Opera version 9.21 or later.

See Also

http://www.nessus.org/u?45badbe6

https://seclists.org/bugtraq/2007/May/354

http://web.archive.org/web/20080522124737/http://www.opera.com/support/search/view/860/

Plugin Details

Severity: High

ID: 25290

File Name: opera_921.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 5/21/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Required KB Items: SMB/Opera/Version_UI

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/21/2007

Reference Information

CVE: CVE-2007-2809

BID: 24080