Vulnerability Name: | CVE-2004-2083 (CCN-21698) | ||||||||
Assigned: | 2004-02-11 | ||||||||
Published: | 2004-02-11 | ||||||||
Updated: | 2022-02-28 | ||||||||
Summary: | Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing." | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-noinfo | ||||||||
Vulnerability Consequences: | File Manipulation | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-2083 Source: CCN Type: SA10760 Opera Browser File Download Extension Spoofing Source: SECUNIA Type: Broken Link, Vendor Advisory 10760 Source: MISC Type: Broken Link, Vendor Advisory http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ Source: CCN Type: Opera Web site Opera Web Browser Source: CONFIRM Type: Broken Link http://www.opera.com/docs/changelogs/windows/750b1/ Source: CCN Type: Opera Download page Download Opera Web Browser Source: OSVDB Type: Broken Link 3917 Source: CCN Type: OSVDB ID: 3917 Opera Browser File Download Extension Spoofing Source: BID Type: Broken Link, Exploit, Third Party Advisory, VDB Entry 9640 Source: CCN Type: BID-9640 Opera Web Browser CLSID File Extension Misrepresentation Vulnerability Source: XF Type: Third Party Advisory, VDB Entry opera-cslid-extension-spoof(21698) Source: XF Type: UNKNOWN opera-cslid-extension-spoof(21698) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |