Mozilla Browser Address Bar Spoofing Weakness
http://secunia.com/advisories/11856/
Critical: Less critical
Impact: Spoofing
Where: From remote
Software:
Mozilla 1.0
Mozilla 1.1
Mozilla 1.2
Mozilla 1.3
Mozilla 1.4
Mozilla 1.5
Mozilla 1.6
Mozilla Firefox 0.x
Description:
A weakness has been reported in Mozilla, allowing malicious people to
conduct phishing attacks.
The weakness is caused due to an error within the handling of URLs.
This can be exploited to potentially trick users into supplying
sensitive information to a malicious web site, because information
displayed in the address bar can be constructed in a certain way,
which may lead users to believe that they're visiting another web site
than the displayed web site.
Example:
http://[trusted_site]%2F%20%20%20.[malicious_site]/
Successful exploitation requires that a malicious web site's domain
supports wildcard DNS and accepts invalid values in the "Host:"
header.
The weakness has been confirmed in Mozilla 1.6 and 1.7rc3 for Windows
and Firefox 0.8 and 0.9rc for Windows. Other versions may also be
affected.
Solution:
Don't follow links from untrusted sources, but input URLs manually in
the address bar.
Meritorios de Filtrado (Kill-File Global):
tella llop, jm (N.B. 2003.10.25)
"El software propietario sera solo para los que lo puedan pagar."
"El software libre es para toda la Humanidad."
Leer las respuestas