Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Browser)  >   Opera Vendors:   Opera Software
Opera Input Validation Error in Processing MIME Content-Type/Content-Displosition Headers Lets Remote Users Spoof the File Download Dialog
SecurityTracker Alert ID:  1012480
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Updated:  Dec 13 2004
Original Entry Date:  Dec 11 2004
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.54, possibly other versions
Description:   A vulnerability was reported in Opera. A remote user may be able to spoof the download dialog box to cause the target user to execute a malicious file.

Secunia Research reported that the browser does not properly validate the filename and the MIME Content-Type header. A remote user can create a specially crafted Content-Disposition and Content-Type header containing '.' characters and ASCII character code 160 to spoof the dialog box.

Version 7.54 for Windows is affected. Other versions and platforms may also be affected.

Impact:   A remote user can create HTML that, when loaded by the target user, will spoof the download dialog box. As a result, the target user may be tricked into downloading and executing a malicious file.
Solution:   The vendor has issued a security update (7.54u1), available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  BeOS, Linux (Any), Apple (Legacy "classic" Mac), QNX, UNIX (FreeBSD), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)
Underlying OS Comments:  Tested on Windows

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC