Nessus Plugin #14246

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

Opera relative path directory traversal file corruption vulnerability

Family:
Windows
Category:
infos
Copyright:
This script is Copyright (C) 2004 David Maciejak
Summary:
Determines the version of Opera.exe
Version:
$Revision: 1.4 $
Cve_id:
-
Bugtraq_id:
9279
Xrefs:
-
Description:

The remote host is using Opera - an alternative web browser.

This version of Opera is vulnerable to a file corruption vulnerability.
This issue is exposed when a user is presented with a file dialog,
which will cause the creation of a temporary file.
It is possible to specify a relative path to another file on the system
using directory traversal sequences when the download dialog is displayed.
If the client user has write permissions to the attacker-specified file,
it will be corrupted.

This could be exploited to delete sensitive files on the systems.

Solution : Install Opera 7.23 or newer.
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.