Vulnerabilities > CVE-2009-4071 - Configuration vulnerability in Opera Browser

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
opera
CWE-16
nessus

Summary

Opera before 10.10, when exception stacktraces are enabled, places scripting error messages from a web site into variables that can be read by a different web site, which allows remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via unspecified vectors.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_6431C4DBDEB411DE90780030843D3802.NASL
    descriptionOpera Team reports : - Fixed a heap buffer overflow in string to number conversion - Fixed an issue where error messages could leak onto unrelated sites - Fixed a moderately severe issue, as reported by Chris Evans of the Google Security Team; details will be disclosed at a later date.
    last seen2020-06-01
    modified2020-06-02
    plugin id42967
    published2009-12-02
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/42967
    titleFreeBSD : opera -- multiple vulnerabilities (6431c4db-deb4-11de-9078-0030843d3802)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-03.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-03 (Opera: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted web page, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. A remote attacker may be able to: trick users into downloading and executing arbitrary files, bypass intended access restrictions, spoof trusted content, spoof URLs, bypass the Same Origin Policy, obtain sensitive information, force subscriptions to arbitrary feeds, bypass the popup blocker, bypass CSS filtering, conduct cross-site scripting attacks, or have other unknown impact. A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application or possibly obtain sensitive information. A physically proximate attacker may be able to access an email account. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59631
    published2012-06-21
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59631
    titleGLSA-201206-03 : Opera: Multiple vulnerabilities
  • NASL familyWindows
    NASL idOPERA_1010.NASL
    descriptionThe version of Opera installed on the remote host is earlier than 10.10. Such versions are potentially affected by multiple issues : - Error messages can leak onto unrelated sites which could lead to cross-site scripting attacks. (941) - Passing very long strings through the string to number conversion using JavaScript in Opera may result in heap buffer overflows. (942) - There is an as-yet unspecified moderately severe issue reported by Chris Evans of the Google Security Team.
    last seen2020-06-01
    modified2020-06-02
    plugin id42892
    published2009-11-25
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/42892
    titleOpera < 10.10 Multiple Vulnerabilities

Oval

accepted2013-12-23T04:01:47.949-05:00
classvulnerability
contributors
  • nameChandan S
    organizationSecPod Technologies
  • nameJosh Turpin
    organizationSymantec Corporation
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
commentOpera Browser is installed
ovaloval:org.mitre.oval:def:6482
descriptionOpera before 10.10, when exception stacktraces are enabled, places scripting error messages from a web site into variables that can be read by a different web site, which allows remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via unspecified vectors.
familywindows
idoval:org.mitre.oval:def:6385
statusaccepted
submitted2009-11-26T01:37:29.630
titleOpera before 10.10 allows to obtain sensitive information and XSS attacks
version9