Vulnerabilities > CVE-2004-2083 - Unspecified vulnerability in Opera Browser
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN opera
nessus
Summary
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 16 |
Nessus
NASL family | Windows |
NASL id | OPERA_FILE_DOWNLOAD_EXTENSION_SPOOFING.NASL |
description | The version of Opera installed on the remote host contains a flaw that may allow a malicious user to trick a user into running arbitrary code. The issue is triggered when an malicious website provides a file for download, but crafts the filename in such a way that the file is executed, rather than saved. It is possible that the flaw may allow arbitrary code execution resulting in a loss of confidentiality, integrity, and/or availability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14247 |
published | 2004-08-10 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14247 |
title | Opera < 7.50 File Download Extension Spoofing |
code |
|