Mozilla Browser Weakness

Discussion in 'other security issues & news' started by Paul Wilders, Jun 14, 2004.

Thread Status:
Not open for further replies.
  1. Paul Wilders

    Paul Wilders Administrator

    Joined:
    Jul 1, 2001
    Posts:
    12,475
    Location:
    The Netherlands
    Mozilla Browser Address Bar Spoofing Weakness

    http://secunia.com/advisories/11856/

    CRITICAL:
    Less critical

    IMPACT:
    Spoofing

    WHERE:
    From remote

    SOFTWARE:
    Mozilla 1.0
    Mozilla 1.1
    Mozilla 1.2
    Mozilla 1.3
    Mozilla 1.4
    Mozilla 1.5
    Mozilla 1.6
    Mozilla Firefox 0.x

    DESCRIPTION:
    A weakness has been reported in Mozilla, allowing malicious people to
    conduct phishing attacks.

    The weakness is caused due to an error within the handling of URLs.
    This can be exploited to potentially trick users into supplying
    sensitive information to a malicious web site, because information
    displayed in the address bar can be constructed in a certain way,
    which may lead users to believe that they're visiting another web
    site than the displayed web site.

    Example:
    http://[trusted_site]/ .[malicious_site]/

    Successful exploitation requires that a malicious web site's domain
    supports wildcard DNS and accepts invalid values in the "Host:"
    header.

    The weakness has been confirmed in Mozilla 1.6 and 1.7rc3 for Windows
    and Firefox 0.8 and 0.9rc for Windows. Other versions may also be
    affected.

    SOLUTION:
    Don't follow links from untrusted sources, but input URLs manually in
    the address bar.

    PROVIDED AND/OR DISCOVERED BY:
    bitlance winter

    OTHER REFERENCES:
    SA11830:
    http://secunia.com/advisories/11830/


    regards.

    paul
     
  2. sig

    sig Registered Member

    Joined:
    Feb 9, 2002
    Posts:
    716
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.