Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
References
Link | Resource |
---|---|
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ | Broken Link Vendor Advisory |
http://secunia.com/advisories/10760 | Broken Link Vendor Advisory |
http://www.securityfocus.com/bid/9640 | Broken Link Exploit Third Party Advisory VDB Entry |
http://www.opera.com/docs/changelogs/windows/750b1/ | Broken Link |
http://www.osvdb.org/3917 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2004-02-10 21:00
Updated : 2022-02-28 10:01
NVD link : CVE-2004-2083
Mitre link : CVE-2004-2083
JSON object : View
CWE
Products Affected
opera
- opera_browser