Opera < 8.54 signedness StyleSheet Overflow

medium Nessus Network Monitor Plugin ID 3515

Synopsis

The remote host contains a web browser that is vulnerable to a buffer overflow vulnerability.

Description

The remote host is using Opera. The version of Opera installed on the remote host contains a buffer overflow that can be triggered by a long value within a stylesheet attribute. Successful exploitation can lead to a browser crash and possibly allow for the execution of arbitrary code subject to the privileges of the user running Opera.

Solution

Upgrade to version 8.54 or higher.

See Also

http://www.securityfocus.com/archive/1/430876/30/0/threaded

http://www.opera.com/docs/changelogs/windows/854

Plugin Details

Severity: Medium

ID: 3515

Family: Web Clients

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 21221

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Reference Information

CVE: CVE-2006-1834

BID: 17513