FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

opera -- download dialog spoofing vulnerability

Affected packages
linux-opera < 8.02
opera < 8.02
opera-devel < 8.02

Details

VuXML ID a2aa24fd-00d4-11da-bc08-0001020eed82
Discovery 2005-07-28
Entry 2005-07-30

A Secunia Advisory reports:

Secunia Research has discovered a vulnerability in Opera, which can be exploited by malicious people to trick users into executing malicious files.

The vulnerability is caused due to an error in the handling of extended ASCII codes in the download dialog. This can be exploited to spoof the file extension in the file download dialog via a specially crafted "Content-Disposition" HTTP header.

Successful exploitation may result in users being tricked into executing a malicious file via the download dialog, but requires that the "Arial Unicode MS" font (ARIALUNI.TTF) has been installed on the system.

References

URL http://secunia.com/advisories/15870/
URL http://www.opera.com/freebsd/changelogs/802/