Vulnerabilities > CVE-2005-2407 - Improper Restriction of Rendered UI Layers or Frames vulnerability in Opera Browser
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
A design error in Opera 8.01 and earlier allows user-assisted attackers to execute arbitrary code by overlaying a malicious new window above a file download dialog box, then tricking the user into double-clicking on the "Run" button, aka "link hijacking".
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | OPERA_802.NASL |
description | The remote host is using Opera, an alternative web browser. The version of Opera installed on the remote host contains several flaws. One involves imaging dragging and could result in cross-site scripting attacks and user file retrieval. A second may let attackers spoof the file extension in the file download dialog provided the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19312 |
published | 2005-07-29 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19312 |
title | Opera < 8.02 Multiple Vulnerabilities |
code |
|
References
- http://secunia.com/advisories/15781
- http://secunia.com/advisories/15781
- http://secunia.com/secunia_research/2005-19/advisory/
- http://secunia.com/secunia_research/2005-19/advisory/
- http://securitytracker.com/id?1015353
- http://securitytracker.com/id?1015353
- http://www.opera.com/linux/changelogs/802/
- http://www.opera.com/linux/changelogs/802/
- http://www.securityfocus.com/bid/15835
- http://www.securityfocus.com/bid/15835
- http://www.vupen.com/english/advisories/2005/1251
- http://www.vupen.com/english/advisories/2005/1251