CVE-2005-0233

The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Broken Link Exploit Vendor Advisory
http://marc.info/?l=bugtraq&m=110782704923280&w=2 Mailing List
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml Exploit Patch Third Party Advisory Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml Exploit Patch Third Party Advisory Vendor Advisory
http://www.mozilla.org/security/announce/mfsa2005-29.html Exploit Patch Third Party Advisory Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html Broken Link Exploit Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-176.html Broken Link
http://www.redhat.com/support/errata/RHSA-2005-384.html Broken Link
http://www.securityfocus.com/bid/12461 Broken Link Third Party Advisory VDB Entry
http://www.shmoo.com/idn Broken Link Exploit Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link Exploit Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029 Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229 Tool Signature
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Broken Link Exploit Vendor Advisory
http://marc.info/?l=bugtraq&m=110782704923280&w=2 Mailing List
http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml Exploit Patch Third Party Advisory Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml Exploit Patch Third Party Advisory Vendor Advisory
http://www.mozilla.org/security/announce/mfsa2005-29.html Exploit Patch Third Party Advisory Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html Broken Link Exploit Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-176.html Broken Link
http://www.redhat.com/support/errata/RHSA-2005-384.html Broken Link
http://www.securityfocus.com/bid/12461 Broken Link Third Party Advisory VDB Entry
http://www.shmoo.com/idn Broken Link Exploit Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link Exploit Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029 Tool Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229 Tool Signature
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*
cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Broken Link, Exploit, Vendor Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Broken Link, Exploit, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=110782704923280&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=110782704923280&w=2 - Mailing List
References () http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml - Exploit, Patch, Third Party Advisory, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml - Exploit, Patch, Third Party Advisory, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml - Exploit, Patch, Third Party Advisory, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml - Exploit, Patch, Third Party Advisory, Vendor Advisory
References () http://www.mozilla.org/security/announce/mfsa2005-29.html - Exploit, Patch, Third Party Advisory, Vendor Advisory () http://www.mozilla.org/security/announce/mfsa2005-29.html - Exploit, Patch, Third Party Advisory, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html - Broken Link, Exploit, Patch, Vendor Advisory () http://www.novell.com/linux/security/advisories/2005_16_mozilla_firefox.html - Broken Link, Exploit, Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-176.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2005-176.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2005-384.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2005-384.html - Broken Link
References () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory
References () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029 - Tool Signature () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100029 - Tool Signature
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229 - Tool Signature () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11229 - Tool Signature

Information

Published : 2005-02-08 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0233

Mitre link : CVE-2005-0233

CVE.ORG link : CVE-2005-0233


JSON object : View

Products Affected

mozilla

  • firefox
  • camino
  • mozilla

omnigroup

  • omniweb

opera_software

  • opera_web_browser

opera

  • opera_browser