Nessus Plugin #14246
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Opera relative path directory traversal file corruption vulnerability
- Family:
- Windows
- Category:
- infos
- Copyright:
- This script is Copyright (C) 2004 David Maciejak
- Summary:
- Determines the version of Opera.exe
- Version:
- $Revision: 1.4 $
- Cve_id:
- -
- Bugtraq_id:
- 9279
- Xrefs:
- -
- Description:
The remote host is using Opera - an alternative web browser.
This version of Opera is vulnerable to a file corruption vulnerability.
This issue is exposed when a user is presented with a file dialog,
which will cause the creation of a temporary file.
It is possible to specify a relative path to another file on the system
using directory traversal sequences when the download dialog is displayed.
If the client user has write permissions to the attacker-specified file,
it will be corrupted.
This could be exploited to delete sensitive files on the systems.
Solution : Install Opera 7.23 or newer.
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.