====================================================================== Secunia Research 04/01/2005 - Mozilla / Mozilla Firefox Download Dialog Source Spoofing - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Description of Vulnerability.........................................3 Solution.............................................................4 Time Table...........................................................5 Credits..............................................................6 About Secunia........................................................7 Verification.........................................................8 ====================================================================== 1) Affected Software Firefox 1.0 Mozilla 1.7.3 Other versions may also be affected. ====================================================================== 2) Severity Rating: Less critical Impact: Spoofing Where: From remote ====================================================================== 3) Description of Vulnerability Secunia Research has discovered a vulnerability in Mozilla / Mozilla Firefox, which can be exploited to spoof the source displayed in the Download Dialog box. The problem is that long sub-domains and paths aren't displayed correctly, which therefore can be exploited to obfuscate what is being displayed in the source field of the Download Dialog box. The vulnerability has been confirmed in Mozilla 1.7.3 for Linux and Mozilla Firefox 1.0. Mozilla Bugzilla report: https://bugzilla.mozilla.org/show_bug.cgi?id=275417 ====================================================================== 4) Solution Currently, no solution is available. However, the vendor reports that this vulnerability will be fixed in upcoming versions of the affected products. ====================================================================== 5) Time Table 24/11/2004 - Vulnerability reported to vendor. 20/12/2004 - The vendor published a public Bugzilla report regarding this vulnerability. 04/01/2005 - Public disclosure. ====================================================================== 6) Credits Discovered by Jakob Balle, Secunia Research. ====================================================================== 7) About Secunia Secunia collects, validates, assesses, and writes advisories regarding all the latest software vulnerabilities disclosed to the public. These advisories are gathered in a publicly available database at the Secunia web site: http://secunia.com/ Secunia offers services to our customers enabling them to receive all relevant vulnerability information to their specific system configuration. Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/ ====================================================================== 8) Verification Please verify this advisory by visiting the Secunia web site: http://secunia.com/secunia_research/2004-15/advisory/ Complete list of vulnerability reports released by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html