Opera < 11.60 Multiple Vulnerabilities (BEAST)

high Nessus プラグイン ID 57039
New! Vulnerability Priority Rating (VPR)

Tenable では、すべての脆弱性に対して動的な VPR が計算されます。VPR は脆弱性の情報を、脅威インテリジェンスや機械学習アルゴリズムと組み合わせて、攻撃時に最も悪用される可能性の高い脆弱性を予測します。詳細は、 「VPR とは何で、CVSS とはどう違うのか」を参照してください。

VPR スコア : 6.7

概要

The remote host contains a web browser that is affected by multiple vulnerabilities.

説明

The version of Opera installed on the remote Windows host is prior to 11.60. It is, therefore, affected by multiple vulnerabilities :

- An unspecified error exists that can allow URL spoofing in the address bar. (CVE-2011-4010)

- Top level domain separation rules are not honored for two-letter top level domains, e.g., '.us' or '.uk', and some three-letter top level domains. This error can allow sites to set the scripting context to the top level domain. Further, this can allow sites to set and read cookies from other sites whose scripting context is set to the same top level domain. (CVE-2011-4681)

- An error exists in the implementation of the JavaScript 'in' operator that can allow sites to verify the existence of variables of sites in other domains.
(CVE-2011-4682)

- An unspecified, moderately severe issue exists. Details are to be disclosed by the vendor at a later date.
(CVE-2011-4683)

- The browser does not properly handle certain corner cases related to certificate revocation. (CVE-2011-4684)

- Unspecified content can cause the 'Dragonfly' component of the browser to crash. (CVE-2011-4685)

- An unspecified error exists related to the 'Web Workers' implementation that can allow application crashes. (CVE-2011-4686)

- An unspecified error exists that can allow remote content to cause denial of service conditions via resource consumption. (CVE-2011-4687)

- An information disclosure vulnerability, known as BEAST, exists in the SSL 3.0 and TLS 1.0 protocols due to a flaw in the way the initialization vector (IV) is selected when operating in cipher-block chaining (CBC) modes. A man-in-the-middle attacker can exploit this to obtain plaintext HTTP header data, by using a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses the HTML5 WebSocket API, the Java URLConnection API, or the Silverlight WebClient API. (CVE-2011-3389)

ソリューション

Upgrade to Opera 11.60 or later.

関連情報

http://www.opera.com/support/kb/view/1005/

https://www.imperialviolet.org/2011/09/23/chromeandbeast.html

https://www.openssl.org/~bodo/tls-cbc.txt

http://www.opera.com/support/kb/view/1004/

http://www.opera.com/support/kb/view/1003/

http://netifera.com/research/

http://web.archive.org/web/20170912020716/http://www.opera.com:80/docs/changelogs/windows/1160/

プラグインの詳細

深刻度: High

ID: 57039

ファイル名: opera_1160.nasl

バージョン: 1.22

タイプ: local

エージェント: windows

ファミリー: Windows

公開日: 2011/12/7

更新日: 2018/11/15

依存関係: opera_installed.nasl

リスク情報

リスクファクター: High

VPR スコア: 6.7

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

ベクトル: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

現状ベクトル: CVSS2#E:H/RL:OF/RC:C

脆弱性の情報

CPE: cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

必要な KB アイテム: SMB/Opera/Version

エクスプロイトが利用可能: true

エクスプロイトの容易さ: Exploits are available

パッチ公開日: 2011/12/6

脆弱性公開日: 2011/8/31

参照情報

CVE: CVE-2011-3389, CVE-2011-4683, CVE-2011-4684, CVE-2011-4685, CVE-2011-4686, CVE-2011-4687, CVE-2011-4681, CVE-2011-4010, CVE-2011-4682

BID: 49778, 50914, 50915, 50916, 51027, 55345

CERT: 864643