Vulnerabilities > CVE-2008-3079 - Remote Security vulnerability in Opera

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
microsoft
opera
critical
nessus

Summary

Unspecified vulnerability in Opera before 9.51 on Windows allows attackers to execute arbitrary code via unknown vectors.

Vulnerable Configurations

Part Description Count
OS
Microsoft
1
Application
Opera
1

Nessus

NASL familyWindows
NASL idOPERA_951.NASL
descriptionThe version of Opera installed on the remote host reportedly is affected by several issues : - Specially crafted HTML canvas elements could reveal data from random areas of memory. - An unspecified arbitrary code execution vulnerability. - Improperly set security status when navigating from HTTP to HTTPS.
last seen2020-06-01
modified2020-06-02
plugin id33396
published2008-07-04
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/33396
titleOpera < 9.51 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#



include("compat.inc");

if (description)
{
  script_id(33396);
  script_version("1.13");

  script_cve_id("CVE-2008-3078", "CVE-2008-3079");
  script_bugtraq_id(30068);
  script_xref(name:"Secunia", value:"30935");
  script_xref(name:"Secunia", value:"30937");
  
  script_name(english:"Opera < 9.51 Multiple Vulnerabilities");
  script_summary(english:"Checks version number of Opera");

 script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web browser that is affected by several
issues." );
 script_set_attribute(attribute:"description", value:
"The version of Opera installed on the remote host reportedly is
affected by several issues :

  - Specially crafted HTML canvas elements could reveal data from
    random areas of memory.

  - An unspecified arbitrary code execution vulnerability.

  - Improperly set security status when navigating from HTTP to
    HTTPS." );
 script_set_attribute(attribute:"see_also", value:"http://web.archive.org/web/20081023171126/http://www.opera.com:80/support/search/view/887/" );
 script_set_attribute(attribute:"see_also", value:"http://web.archive.org/web/20170730162148/http://www.opera.com/docs/changelogs/windows/951/" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Opera version 9.51 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(200);
 script_set_attribute(attribute:"plugin_publication_date", value: "2008/07/04");
 script_cvs_date("Date: 2018/11/15 20:50:28");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:opera:opera_browser");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");

  script_dependencies("opera_installed.nasl");
  script_require_keys("SMB/Opera/Version_UI");

  exit(0);
}


include("global_settings.inc");


version_ui = get_kb_item("SMB/Opera/Version_UI");
if (isnull(version_ui)) exit(0);

if (version_ui =~ "^([0-8]\.|9\.([0-4][0-9]|50)($|[^0-9]))")
{
  if (report_verbosity)
  {
    report = string(
      "\n",
      "Opera version ", version_ui, " is currently installed on the remote host.\n"
    );
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(get_kb_item("SMB/transport"));
}