Vulnerabilities > CVE-2010-4587 - Unspecified vulnerability in Opera Browser

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
opera
nessus

Summary

Opera before 11.00 on Windows does not properly implement the Insecure Third Party Module warning message, which might make it easier for user-assisted remote attackers to have an unspecified impact via a crafted module.

Vulnerable Configurations

Part Description Count
Application
Opera
114
OS
Microsoft
1

Nessus

NASL familyWindows
NASL idOPERA_1100.NASL
descriptionThe version of Opera installed on the remote host is earlier than 11.00. Such versions are potentially affected by the following issues : - An error exists such that web page content can be displayed over dialog boxes leading to security warning misrepresentation. (977, CVE-2010-4579) - An error exists such that WAP form contents can be leaked to third-party sites. (979, CVE-2010-4580) - An unspecified high severity issue with unknown impact exists. (CVE-2010-4581) - An error exists in the handling of security policies during extension updates. (CVE-2010-4582) - An error exists when
last seen2020-06-01
modified2020-06-02
plugin id51343
published2010-12-17
reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/51343
titleOpera < 11 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(51343);
  script_version("1.10");
  script_cvs_date("Date: 2018/11/15 20:50:27");

  script_cve_id(
    "CVE-2010-4579","CVE-2010-4580","CVE-2010-4581","CVE-2010-4582",
    "CVE-2010-4583","CVE-2010-4584","CVE-2010-4585","CVE-2010-4586",
    "CVE-2010-4587"
  );
  script_bugtraq_id(45461);
  script_xref(name:"Secunia", value:"42653");

  script_name(english:"Opera < 11 Multiple Vulnerabilities");
  script_summary(english:"Checks version number of Opera");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web browser that is affected by multiple
vulnerabilities");
  script_set_attribute(attribute:"description", value:
"The version of Opera installed on the remote host is earlier than
11.00.  Such versions are potentially affected by the following 
issues :

  - An error exists such that web page content can be
    displayed over dialog boxes leading to security
    warning misrepresentation. (977, CVE-2010-4579)

  - An error exists such that WAP form contents can be 
    leaked to third-party sites. (979, CVE-2010-4580)

  - An unspecified high severity issue with unknown
    impact exists. (CVE-2010-4581)

  - An error exists in the handling of security policies
    during extension updates. (CVE-2010-4582)

  - An error exists when 'Opera Turbo' is enabled that 
    does not display a page's security information 
    correctly. (CVE-2010-4583)

  - An error exists when viewing sites over HTTPS such that
    problems with X.509 certificates are not displayed
    properly. (CVE-2010-4584)

  - An error exists in the automatic update functionality 
    that allows an attacker to cause a denial of service
    by crashing the application. (CVE-2010-4585)

  - The 'WebSockets' implementation contains unspecified 
    errors with unknown impact. (CVE-2010-4586)

  - An error exists in the implementation of the 'Insecure 
    Third Party Module' warning messages that results in an 
    unspecified vulnerability. (CVE-2010-4587)"
  );
  script_set_attribute(attribute:"see_also", value:"http://web.archive.org/web/20170901003842/http://www.opera.com/docs/changelogs/windows/1100/");
  script_set_attribute(attribute:"see_also", value:"http://web.archive.org/web/20130225221042/http://www.opera.com/support/kb/view/977/");
  script_set_attribute(attribute:"see_also", value:"http://web.archive.org/web/20130225211759/http://www.opera.com/support/kb/view/979/");
  script_set_attribute(attribute:"solution", value:"Upgrade to Opera 11 or later.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/12/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/12/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/12/17");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:opera:opera_browser");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("opera_installed.nasl");
  script_require_keys("SMB/Opera/Version");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");

version = get_kb_item_or_exit("SMB/Opera/Version");

version_ui = get_kb_item("SMB/Opera/Version_UI");
if (isnull(version_ui)) version_report = version;
else version_report = version_ui;

install_path = get_kb_item("SMB/Opera/Path");

if (ver_compare(ver:version, fix:'11.0.1156.0') == -1)
{
  if (report_verbosity > 0)
  {
    report = 
      '\n  Path              : ' + install_path +
      '\n  Installed version : ' + version_report +
      '\n  Fixed version     : 11.00\n';
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(port:get_kb_item("SMB/transport"));
  exit(0);
}
else exit(0, "The host is not affected since Opera "+version_report+" is installed.");