Vulnerability Name:

CVE-2005-3006 (CCN-22335)

Assigned:2005-09-20
Published:2005-09-20
Updated:2017-07-11
Summary:The mail client in Opera before 8.50 opens attached files from the user's cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-3006

Source: BUGTRAQ
Type: UNKNOWN
20050920 Secunia Research: Opera Mail Client Attachment Spoofing and Script Insertion

Source: CCN
Type: SA16645
Opera Mail Client Attachment Spoofing and Script Insertion

Source: SECUNIA
Type: Patch, Vendor Advisory
16645

Source: MISC
Type: Patch, Vendor Advisory
http://secunia.com/secunia_research/2005-42/advisory/

Source: CONFIRM
Type: UNKNOWN
http://www.opera.com/docs/changelogs/linux/850/

Source: CONFIRM
Type: UNKNOWN
http://www.opera.com/docs/changelogs/windows/850/

Source: CCN
Type: Opera Download Web page
Opera 8.50 for Windows

Source: CCN
Type: Opera Mail Web page
Opera Mail

Source: OSVDB
Type: Patch
19508

Source: CCN
Type: OSVDB ID: 19508
Opera Mail Client User Cache Directory file:// Arbitrary Script Execution

Source: SUSE
Type: UNKNOWN
SuSE-SA:2005:057

Source: BID
Type: UNKNOWN
14880

Source: CCN
Type: BID-14880
Opera Web Browser Mail Client Multiple Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2005-1789

Source: XF
Type: UNKNOWN
opera-mail-file-xss(22335)

Source: XF
Type: UNKNOWN
opera-mail-file-xss(22335)

Source: SUSE
Type: SUSE-SA:2005:057
opera: remote code execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:opera:opera_browser:1.00:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:2.00:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:2.12:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.00:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.00:beta:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.21:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.50:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.51:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.60:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.61:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.62:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:3.62:beta:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.00:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:4.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.11:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.12:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.03:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.04:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.05:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.06:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.11:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.12:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.03:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.11:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.20:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.21:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.22:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.23:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.50:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.51:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.52:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.53:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.54:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.60:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:*:*:*:*:*:*:*:* (Version <= 8.02)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20053006
    V
    CVE-2005-3006
    2015-11-16
    BACK
    opera opera browser 1.00
    opera opera browser 2.00
    opera opera browser 2.10
    opera opera browser 2.10 beta1
    opera opera browser 2.10 beta2
    opera opera browser 2.10 beta3
    opera opera browser 2.12
    opera opera browser 3.00
    opera opera browser 3.00 beta
    opera opera browser 3.10
    opera opera browser 3.21
    opera opera browser 3.50
    opera opera browser 3.51
    opera opera browser 3.60
    opera opera browser 3.61
    opera opera browser 3.62
    opera opera browser 3.62 beta
    opera opera browser 4.00
    opera opera browser 4.00 beta2
    opera opera browser 4.00 beta3
    opera opera browser 4.00 beta4
    opera opera browser 4.00 beta5
    opera opera browser 4.00 beta6
    opera opera browser 4.01
    opera opera browser 4.02
    opera opera browser 5.0
    opera opera browser 5.0 beta2
    opera opera browser 5.0 beta3
    opera opera browser 5.0 beta4
    opera opera browser 5.0 beta5
    opera opera browser 5.0 beta6
    opera opera browser 5.0 beta7
    opera opera browser 5.0 beta8
    opera opera browser 5.02
    opera opera browser 5.10
    opera opera browser 5.11
    opera opera browser 5.12
    opera opera browser 6.0
    opera opera browser 6.0 beta1
    opera opera browser 6.0 beta2
    opera opera browser 6.0 tp1
    opera opera browser 6.0 tp2
    opera opera browser 6.0 tp3
    opera opera browser 6.01
    opera opera browser 6.1
    opera opera browser 6.1 beta1
    opera opera browser 6.02
    opera opera browser 6.03
    opera opera browser 6.04
    opera opera browser 6.05
    opera opera browser 6.06
    opera opera browser 6.11
    opera opera browser 6.12
    opera opera browser 7.0
    opera opera browser 7.0 beta1
    opera opera browser 7.0 beta1_v2
    opera opera browser 7.0 beta2
    opera opera browser 7.01
    opera opera browser 7.02
    opera opera browser 7.03
    opera opera browser 7.10
    opera opera browser 7.10 beta1
    opera opera browser 7.11
    opera opera browser 7.11 beta2
    opera opera browser 7.20
    opera opera browser 7.20 beta7
    opera opera browser 7.21
    opera opera browser 7.22
    opera opera browser 7.23
    opera opera browser 7.50
    opera opera browser 7.50 beta1
    opera opera browser 7.51
    opera opera browser 7.52
    opera opera browser 7.53
    opera opera browser 7.54
    opera opera browser 7.54 update1
    opera opera browser 7.54 update2
    opera opera browser 7.60
    opera opera browser 8.0
    opera opera browser 8.0 beta1
    opera opera browser 8.0 beta2
    opera opera browser 8.0 beta3
    opera opera browser 8.01
    opera opera browser *