TITLE:
Mozilla Firefox Download Dialog Spoofing Vulnerabilities

SECUNIA ADVISORY ID:
SA12979

VERIFY ADVISORY:
http://secunia.com/advisories/12979/

CRITICAL:
Moderately critical

IMPACT:
Spoofing

WHERE:
>From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/
Mozilla Firefox 0.x
http://secunia.com/product/3256/

DESCRIPTION:
Secunia Research has discovered two vulnerabilities in Mozilla
Firefox, which can be exploited by malicious people to spoof 
file
types in the file download dialog.

1) The filename and the "Content-Type" header are not 
sufficiently
validated before being displayed in the file download dialog. 
This
can be exploited to spoof file types in the file download 
dialog by
sending specially crafted headers containing white spaces, 
dots, and
ASCII bytes 160.

Successful exploitation may trick a user into executing malware 
if
the file is opened through the file download dialog.

The vulnerability has been confirmed in Mozilla Firefox 0.10.1 
for
Windows. Other versions may also be affected.

2) The "Content-Type" header is used for associating a file to 
a file
type in the file download dialog, but the file extension is 
left
intact when saving the file to disk with "Save to Disk". This 
can be
exploited to spoof file types in the file download dialog.

Successful exploitation may result in malware being saved to 
the
download directory, which by default is the desktop.

NOTE: If the downloaded malware is a shortcut or some 
executable
file, then the icon can be spoofed in the download manager and 
on the
desktop.

The vulnerability has been confirmed in Mozilla Firefox 1.0 for
Windows. Other versions may also be affected.

SOLUTION:
The vulnerabilities have been partially fixed in version 1.0.1.

ORIGINAL ADVISORY:
Secunia Research:
http://secunia.com/secunia_research/2004-11/advisory/

OTHER REFERENCES:
1) https://bugzilla.mozilla.org/show_bug.cgi?id=267122
2) https://bugzilla.mozilla.org/show_bug.cgi?id=267123
https://bugzilla.mozilla.org/show_bug.cgi?id=275441
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to