CVE-2005-0238

The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Exploit Vendor Advisory
http://www.securityfocus.com/bid/12461 Broken Link Third Party Advisory VDB Entry
http://www.shmoo.com/idn Broken Link Exploit Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link Exploit Vendor Advisory
https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 Broken Link Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory VDB Entry
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Exploit Vendor Advisory
http://www.securityfocus.com/bid/12461 Broken Link Third Party Advisory VDB Entry
http://www.shmoo.com/idn Broken Link Exploit Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link Exploit Vendor Advisory
https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 Broken Link Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*
cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Exploit, Vendor Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory
References () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory
References () https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0238

Mitre link : CVE-2005-0238

CVE.ORG link : CVE-2005-0238


JSON object : View

Products Affected

mozilla

  • mozilla
  • camino

omnigroup

  • omniweb

gnome

  • epiphany

opera

  • opera_browser