The remote host is using Opera - an alternative web browser. This version of Opera is vulnerable to a file corruption vulnerability. This issue is exposed when a user is presented with a file dialog, which will cause the creation of a temporary file. It is possible to specify a relative path to another file on the system using directory traversal sequences when the download dialog is displayed. If the client user has write permissions to the attacker-specified file, it will be corrupted. This could be exploited to delete sensitive files on the systems.
Install Opera 7.23 or newer.
- Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
- Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
- Mozilla/Firefox default installation file permission flaw
- Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
- Microsoft Access Snapshot Viewer ActiveX Control Vulnerability