Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
References
Link | Resource |
---|---|
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ | Broken Link Vendor Advisory |
http://secunia.com/advisories/10760 | Broken Link Vendor Advisory |
http://www.opera.com/docs/changelogs/windows/750b1/ | Broken Link |
http://www.osvdb.org/3917 | Broken Link |
http://www.securityfocus.com/bid/9640 | Broken Link Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 | Third Party Advisory VDB Entry |
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ | Broken Link Vendor Advisory |
http://secunia.com/advisories/10760 | Broken Link Vendor Advisory |
http://www.opera.com/docs/changelogs/windows/750b1/ | Broken Link |
http://www.osvdb.org/3917 | Broken Link |
http://www.securityfocus.com/bid/9640 | Broken Link Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 | Third Party Advisory VDB Entry |
Configurations
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/10760 - Broken Link, Vendor Advisory | |
References | () http://www.opera.com/docs/changelogs/windows/750b1/ - Broken Link | |
References | () http://www.osvdb.org/3917 - Broken Link | |
References | () http://www.securityfocus.com/bid/9640 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 - Third Party Advisory, VDB Entry |
28 Feb 2022, 18:01
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | (SECUNIA) http://secunia.com/advisories/10760 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://www.opera.com/docs/changelogs/windows/750b1/ - Broken Link | |
References | (OSVDB) http://www.osvdb.org/3917 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 - Third Party Advisory, VDB Entry | |
References | (MISC) http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ - Broken Link, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/9640 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:opera_software:opera_web_browser:7.0_beta2:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.10:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0.1:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0_beta1:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.11b:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.20_beta1_build2981:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.20:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.23:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0.2:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.0.3:*:win32:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.11j:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.11:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.21:*:*:*:*:*:*:* |
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* |
Information
Published : 2004-02-11 05:00
Updated : 2024-11-20 23:52
NVD link : CVE-2004-2083
Mitre link : CVE-2004-2083
CVE.ORG link : CVE-2004-2083
JSON object : View
Products Affected
opera
- opera_browser
CWE