Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread tx


Dr. Neal Krawetz PhD wrote:
> Gobbles aka n3td3v,
> 
> Please stop harassing aspiring young PhD students on this list.
> 
> I speak for everyone in this community when I say that we are all tired
> of your shenanigans and that it is time for you to grow up.  Clearly
> you do not have a PhD, and to the best of my knowledge you are not
> actively pursuing one, and therefor have no voice in computer security.

I agree, don't you know that these young PhD students had to rack up 
tons of debt and/or get their parents to shell out enough cash to feed a 
small town in a third world country in order to get a piece of paper 
that will apparently allow them to post on a public listserv? Give them 
a break, they've got enough worries.

and to Dr. Neal Krawetz - Stop being an elitist tool.

-tx

-- 
-tx [at] lowtechlive.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread coderman
On 5/30/07, Dr. Neal Krawetz PhD <[EMAIL PROTECTED]> wrote:
> Gobbles aka n3td3v,

first this was funny.. then it got old.  now it's funny again!
behold: a philosopher's mind at work!


> you do not have a PhD, and to the best of my knowledge you are not
> actively pursuing one, and therefor have no voice in computer security.

how telling that you favor credentials over capabilities.

moats and beams and all that...

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread Joey Mengele
Dude did you get your PhD at K-Mart or are you just retarded? It 
seems like maybe Dr. Chris and Dr. Neal are the real trolls in this 
 joke of an 'industry'...

_Joey
Qualifications (in order of descending worthlessness):
Certified Drive by Pharming Expert / CISSP / PhD

On Wed, 30 May 2007 14:12:44 -0400 "Dr. Neal Krawetz PhD" 
<[EMAIL PROTECTED]> wrote:
>Gobbles aka n3td3v,
>
>Please stop harassing aspiring young PhD students on this list.
>
>I speak for everyone in this community when I say that we are all 
>tired
>of your shenanigans and that it is time for you to grow up.  
>Clearly
>you do not have a PhD, and to the best of my knowledge you are not
>actively pursuing one, and therefor have no voice in computer 
>security.
>
>To my fans:  I have just finished reading Niels Provos' work from 
>2001,
>and plan on presenting a summary of these dated works at Blackhat 
>2007
>this summer.  I look forward to seeing you all there!
>
>Dr. Neal Krawetz, PhD
>
>http://www.hackerfactor.com/
>http://www.krawetz.org/
>
>
>On Wed, May 30, 2007 at 11:57:59AM -0400, Joey Mengele wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>> 
>> Hello List,
>> 
>> >
>> >
>> >Frequently Asked Questions
>> >
>> >
>> >Q: Who is at risk?
>> >
>> >A: Anyone who has installed the Firefox Web Browser and one or
>> >more
>> >vulnerable extensions. These include, but are not limited to:
>> >Google
>> >Toolbar, Google Browser Sync, Yahoo Toolbar, Del.icio.us
>> >Extension,
>> >Facebook Toolbar, AOL Toolbar, Ask.com Toolbar, LinkedIn 
>Browser
>> >Toolbar, Netcraft Anti-Phishing Toolbar, PhishTank SiteChecker.
>> >
>> 
>> Don't you mean anyone who has these installed and is using a 
>rogue
>> or compromised DNS server?
>> 
>> >Q: How many people are at risk?
>> >
>> >A: Millions. Exact numbers for each toolbar/extension are not
>> >released
>> >by the vendors. Google Toolbar, which is one of the most 
>popular
>> >of
>> >the vulnerable extensions, is installed as part of the download
>> >process with WinZip, RealNetworks' Real Player and Adobe's
>> >Shockwave.
>> >Google publicly pays website publishers $1 for each copy of
>> >Firefox +
>> >Google Toolbar that customers download and install through a
>> >publisher's website.
>> >
>> >Google confirmed in 2005 that their toolbar product's user base
>> >was
>> >"in the millions". Given the number of distribution deals that
>> >have
>> >been signed, the number of users can only have grown in size
>> >since.
>> >
>> 
>> Oh stop being such a drama queen. Are you suggesting "millions"
>> have their DNS compromised and their home routers owned? Isn't 
>this
>> bug rather inconsequential for these people anyway?
>> 
>> >Q: When am I at risk?
>> >
>> >A: When you use a public wireless network, an untrusted 
>Internet
>> >connection, or a wireless home router with the default password
>> >set.
>> >
>> 
>> Duh. You don't need to be running some silly toolbar to be at 
>risk
>> in this scenario.
>> 
>> >Q: What can I do to reduce my risk?
>> >
>> >A: Users with wireless home routers should change their 
>password
>> >to
>> >something other than the default.
>> >
>> 
>> Are you really suggesting wide scale wireless home router
>> compromise? Is there an army of hacker dudes driving around
>> compromising unprotected wireless routers in the millions that I 
>am
>> not aware of? Surely the Security Focus PharmConMeter(TM) would
>> have alerted me if this were the case!
>> 
>> >
>> >Q: Why is this attack possible?
>> >
>> >A: The problem stems from design flaws, false assumptions, and 
>a
>> >lack
>> >of solid developer documentation instructing extension authors 
>on
>> >the
>> >best way to secure their code.
>> >
>> 
>> See also "because your DNS server is owned"
>> 
>> >--
>> >Description Of Vulnerability
>> >--
>> >
>> 
>> Blabla, you are a technical genius. Let's move on Dr. Chris.
>> 
>> >
>> >---
>> >When Are Users Vulnerable
>> >---
>> >
>> >Users are most vulnerable to this attack when they cannot trust
>> >their
>> >domain name server. Examples of such a situation include:
>> >
>> >* Using a public or unencrypted wireless network.
>> >
>> >* Using a network router (wireless or wired) at home that 
>has
>> >been
>> >infected/hacked through a drive by pharming attack. This
>> >particular
>> >risk can be heavily reduced by changing the default password on
>> >your
>> >home router.
>> >
>> 
>> Hahahahahahha. Drive by pharming. What a fucking joke. This
>> industry is the best.
>> 
>> >
>> >
>> >Fixing The Problem
>> >
>> >
>> >
>> >The number of vulnerable extensions is more lengthy than those
>> >listed
>> >in this document. Until vendors have fixed the problems, users
>> >should
>> >remove/disable all Firefox extensions except those th

Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread Dr. Neal Krawetz PhD
Gobbles aka n3td3v,

Please stop harassing aspiring young PhD students on this list.

I speak for everyone in this community when I say that we are all tired
of your shenanigans and that it is time for you to grow up.  Clearly
you do not have a PhD, and to the best of my knowledge you are not
actively pursuing one, and therefor have no voice in computer security.

To my fans:  I have just finished reading Niels Provos' work from 2001,
and plan on presenting a summary of these dated works at Blackhat 2007
this summer.  I look forward to seeing you all there!

Dr. Neal Krawetz, PhD

http://www.hackerfactor.com/
http://www.krawetz.org/


On Wed, May 30, 2007 at 11:57:59AM -0400, Joey Mengele wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Hello List,
> 
> >
> >
> >Frequently Asked Questions
> >
> >
> >Q: Who is at risk?
> >
> >A: Anyone who has installed the Firefox Web Browser and one or
> >more
> >vulnerable extensions. These include, but are not limited to:
> >Google
> >Toolbar, Google Browser Sync, Yahoo Toolbar, Del.icio.us
> >Extension,
> >Facebook Toolbar, AOL Toolbar, Ask.com Toolbar, LinkedIn Browser
> >Toolbar, Netcraft Anti-Phishing Toolbar, PhishTank SiteChecker.
> >
> 
> Don't you mean anyone who has these installed and is using a rogue
> or compromised DNS server?
> 
> >Q: How many people are at risk?
> >
> >A: Millions. Exact numbers for each toolbar/extension are not
> >released
> >by the vendors. Google Toolbar, which is one of the most popular
> >of
> >the vulnerable extensions, is installed as part of the download
> >process with WinZip, RealNetworks' Real Player and Adobe's
> >Shockwave.
> >Google publicly pays website publishers $1 for each copy of
> >Firefox +
> >Google Toolbar that customers download and install through a
> >publisher's website.
> >
> >Google confirmed in 2005 that their toolbar product's user base
> >was
> >"in the millions". Given the number of distribution deals that
> >have
> >been signed, the number of users can only have grown in size
> >since.
> >
> 
> Oh stop being such a drama queen. Are you suggesting "millions"
> have their DNS compromised and their home routers owned? Isn't this
> bug rather inconsequential for these people anyway?
> 
> >Q: When am I at risk?
> >
> >A: When you use a public wireless network, an untrusted Internet
> >connection, or a wireless home router with the default password
> >set.
> >
> 
> Duh. You don't need to be running some silly toolbar to be at risk
> in this scenario.
> 
> >Q: What can I do to reduce my risk?
> >
> >A: Users with wireless home routers should change their password
> >to
> >something other than the default.
> >
> 
> Are you really suggesting wide scale wireless home router
> compromise? Is there an army of hacker dudes driving around
> compromising unprotected wireless routers in the millions that I am
> not aware of? Surely the Security Focus PharmConMeter(TM) would
> have alerted me if this were the case!
> 
> >
> >Q: Why is this attack possible?
> >
> >A: The problem stems from design flaws, false assumptions, and a
> >lack
> >of solid developer documentation instructing extension authors on
> >the
> >best way to secure their code.
> >
> 
> See also "because your DNS server is owned"
> 
> >--
> >Description Of Vulnerability
> >--
> >
> 
> Blabla, you are a technical genius. Let's move on Dr. Chris.
> 
> >
> >---
> >When Are Users Vulnerable
> >---
> >
> >Users are most vulnerable to this attack when they cannot trust
> >their
> >domain name server. Examples of such a situation include:
> >
> >* Using a public or unencrypted wireless network.
> >
> >* Using a network router (wireless or wired) at home that has
> >been
> >infected/hacked through a drive by pharming attack. This
> >particular
> >risk can be heavily reduced by changing the default password on
> >your
> >home router.
> >
> 
> Hahahahahahha. Drive by pharming. What a fucking joke. This
> industry is the best.
> 
> >
> >
> >Fixing The Problem
> >
> >
> >
> >The number of vulnerable extensions is more lengthy than those
> >listed
> >in this document. Until vendors have fixed the problems, users
> >should
> >remove/disable all Firefox extensions except those that they are
> >sure
> >they have downloaded from the official Firefox Add-ons website
> >(https://addons.mozilla.org). If in doubt, delete the extension,
> >and
> >then download it again from a safe place.
> >
> 
> No way dude, use The Internet Explorer!
> 
> 
> >-
> >Self Disclosure/Conflict of Interest Statement
> >-
> >
> >
> >Christopher Soghoian is a PhD student in the School of Informatics
> >at
> >Indiana University

Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread Matthew Murphy
On 5/30/07, Steven Adair <[EMAIL PROTECTED]> wrote:
> We are also at risk from rogue developers, people that have
> hacked/poisoned your trusted DNS provider, those that have modified your
> /etc/hosts, /etc/resolv.conf, windows\system32\drivers\etc\hosts (and/or
> related files), people that have hacked the update server and put there
> own malicious version there, and the unlocked workstation attack from an
> attacker with a USB flash drive with a malicious update that might sit
> down at your workstation and -pwn- you.

Or, more simply, from a brute-force poisoning attack that doesn't
involve compromising the trusted DNS provider at all.  It's been known
for *at least as long as I've been in this business* that DNS is *not*
secure, even when both the DNS server and the requesting client are
not compromised.  There's no significant authentication of the DNS
server's reply, so DNS responses can be trivially spoofed by an
attacker who knows a window of time wherein you might request the
address of a particular host.

An example of such a condition: scheduled automatic updates.  That
just happens to be exactly what is described here.  You do the math.

This really should have been articulated in the original advisory,
IMO.  When applications depend on DNS for trust decisions, virtually
*every* internet connection is untrusted.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread Steven Adair
We are also at risk from rogue developers, people that have
hacked/poisoned your trusted DNS provider, those that have modified your
/etc/hosts, /etc/resolv.conf, windows\system32\drivers\etc\hosts (and/or
related files), people that have hacked the update server and put there
own malicious version there, and the unlocked workstation attack from an
attacker with a USB flash drive with a malicious update that might sit
down at your workstation and -pwn- you.

Steven

> This information also posted (with html link goodness) to
> http://paranoia.dubfire.net/2007/05/remote-vulnerability-in-firefox.html
>
> --
> Executive Summary
> --
>
> A vulnerability exists in the upgrade mechanism used by a number of
> high profile Firefox extensions. These include Google Toolbar, Google
> Browser Sync, Yahoo Toolbar, Del.icio.us Extension, Facebook Toolbar,
> AOL Toolbar, Ask.com Toolbar, LinkedIn Browser Toolbar, Netcraft
> Anti-Phishing Toolbar, PhishTank SiteChecker and a number of others,
> mainly commercial extensions.
>
> Users of the Google Pack suite of software are most likely vulnerable,
> as this includes the Google Toolbar for Firefox.
>
> The latest version of all of these listed, and many other extensions
> are vulnerable. This is not restricted to a specific version of
> Firefox.
>
> Users are vulnerable and are at risk of an attacker silently
> installing malicious software on their computers. This possibility
> exists whenever the user cannot trust their domain name server (DNS)
> or network connection. Examples of this include public wireless
> networks, and users connected to compromised home routers.
>
> The vast majority of the open source/hobbyist made Firefox extensions
> - those that are hosted at https://addons.mozilla.org - are not
> vulnerable to this attack. Users of popular Firefox extensions such as
> NoScript, Greasemonkey, and AdBlock Plus have nothing to worry about.
>
> In addition to notifying the Firefox Security Team, some of the most
> high-profile vulnerable software vendors (Google, Yahoo, and Facebook)
> were notified 45 days ago, although none have yet released a fix. The
> number of vulnerable extensions is more lengthy than those listed in
> this document. Until vendors have fixed the problems, users should
> remove/disable all Firefox extensions except those that they are sure
> they have downloaded from the official Firefox Add-ons website
> (https://addons.mozilla.org). If in doubt, delete the extension, and
> then download it again from a safe place.
>
> In Firefox, this can be done by going to Tools->Add-ons. Select the
> individual extensions, and then click on the uninstall button.
>
> 
> Frequently Asked Questions
> 
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread Joey Mengele
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello List,

>
>
>Frequently Asked Questions
>
>
>Q: Who is at risk?
>
>A: Anyone who has installed the Firefox Web Browser and one or
>more
>vulnerable extensions. These include, but are not limited to:
>Google
>Toolbar, Google Browser Sync, Yahoo Toolbar, Del.icio.us
>Extension,
>Facebook Toolbar, AOL Toolbar, Ask.com Toolbar, LinkedIn Browser
>Toolbar, Netcraft Anti-Phishing Toolbar, PhishTank SiteChecker.
>

Don't you mean anyone who has these installed and is using a rogue
or compromised DNS server?

>Q: How many people are at risk?
>
>A: Millions. Exact numbers for each toolbar/extension are not
>released
>by the vendors. Google Toolbar, which is one of the most popular
>of
>the vulnerable extensions, is installed as part of the download
>process with WinZip, RealNetworks' Real Player and Adobe's
>Shockwave.
>Google publicly pays website publishers $1 for each copy of
>Firefox +
>Google Toolbar that customers download and install through a
>publisher's website.
>
>Google confirmed in 2005 that their toolbar product's user base
>was
>"in the millions". Given the number of distribution deals that
>have
>been signed, the number of users can only have grown in size
>since.
>

Oh stop being such a drama queen. Are you suggesting "millions"
have their DNS compromised and their home routers owned? Isn't this
bug rather inconsequential for these people anyway?

>Q: When am I at risk?
>
>A: When you use a public wireless network, an untrusted Internet
>connection, or a wireless home router with the default password
>set.
>

Duh. You don't need to be running some silly toolbar to be at risk
in this scenario.

>Q: What can I do to reduce my risk?
>
>A: Users with wireless home routers should change their password
>to
>something other than the default.
>

Are you really suggesting wide scale wireless home router
compromise? Is there an army of hacker dudes driving around
compromising unprotected wireless routers in the millions that I am
not aware of? Surely the Security Focus PharmConMeter(TM) would
have alerted me if this were the case!

>
>Q: Why is this attack possible?
>
>A: The problem stems from design flaws, false assumptions, and a
>lack
>of solid developer documentation instructing extension authors on
>the
>best way to secure their code.
>

See also "because your DNS server is owned"

>--
>Description Of Vulnerability
>--
>

Blabla, you are a technical genius. Let's move on Dr. Chris.

>
>---
>When Are Users Vulnerable
>---
>
>Users are most vulnerable to this attack when they cannot trust
>their
>domain name server. Examples of such a situation include:
>
>* Using a public or unencrypted wireless network.
>
>* Using a network router (wireless or wired) at home that has
>been
>infected/hacked through a drive by pharming attack. This
>particular
>risk can be heavily reduced by changing the default password on
>your
>home router.
>

Hahahahahahha. Drive by pharming. What a fucking joke. This
industry is the best.

>
>
>Fixing The Problem
>
>
>
>The number of vulnerable extensions is more lengthy than those
>listed
>in this document. Until vendors have fixed the problems, users
>should
>remove/disable all Firefox extensions except those that they are
>sure
>they have downloaded from the official Firefox Add-ons website
>(https://addons.mozilla.org). If in doubt, delete the extension,
>and
>then download it again from a safe place.
>

No way dude, use The Internet Explorer!


>-
>Self Disclosure/Conflict of Interest Statement
>-
>
>
>Christopher Soghoian is a PhD student in the School of Informatics
>at
>Indiana University. He is a member of the Stop Phishing Research
>Group. His research is focused in the areas of phishing, click-
>fraud,
>search privacy and airport security. He has worked an intern with
>Google, Apple, IBM and Cybertrust. He is the co-inventor of
>several
>pending patents in the areas of mobile authentication, anti-
>phishing,
>and virtual machine defense against viruses. His website is
>http://www.dubfire.net/chris/ and he blogs regularly at
>http://paranoia.dubfire.net
>

Impressive. The scholarly source Wikipedia [1] says you are also
that guy that made boarding passes for Al Qaeda? Kudos.

>
>Information on this vulnerability was disclosed for free to the
>above
>listed vendors.
>

Oi! Such a deal.

_Joey

[1] http://en.wikipedia.org/wiki/Christopher_Soghoian
-BEGIN PGP SIGNATURE-
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.5

wpwEAQECAAYFAkZdngYACgkQbnLzJSXnVjORJgP/e8QL9VRf4EsTEbkg91b8+J86wf1P
3eYeDo7toYMiT7dV/mKgMSzO3XNVm

Re: [Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-30 Thread Tim


> A DNS based man in the middle attack will not work against a SSL
> enabled webserver. This is because SSL certificates certify an
> association between a specific domain name and an ip address. An
> attempted man in the middle attack against a SSL enabled Firefox
> update server will result in the browser rejecting the connection to
> the masquerading update server, as the ip address in the SSL
> certificate, and the ip address returned by the DNS server will not
> match.

False.  SSL certificates do not authenticate DNS/IP associations.  They
authenticate public key/DNS associations.  The difference is likely
irrelevant to this issue, but be sure you understand SSL's PKI when you
explain such things, lest you confuse crypto noobs.

tim

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] New Vulnerability against Firefox/ Major Extensions

2007-05-29 Thread Christopher Soghoian
This information also posted (with html link goodness) to
http://paranoia.dubfire.net/2007/05/remote-vulnerability-in-firefox.html

--
Executive Summary
--

A vulnerability exists in the upgrade mechanism used by a number of
high profile Firefox extensions. These include Google Toolbar, Google
Browser Sync, Yahoo Toolbar, Del.icio.us Extension, Facebook Toolbar,
AOL Toolbar, Ask.com Toolbar, LinkedIn Browser Toolbar, Netcraft
Anti-Phishing Toolbar, PhishTank SiteChecker and a number of others,
mainly commercial extensions.

Users of the Google Pack suite of software are most likely vulnerable,
as this includes the Google Toolbar for Firefox.

The latest version of all of these listed, and many other extensions
are vulnerable. This is not restricted to a specific version of
Firefox.

Users are vulnerable and are at risk of an attacker silently
installing malicious software on their computers. This possibility
exists whenever the user cannot trust their domain name server (DNS)
or network connection. Examples of this include public wireless
networks, and users connected to compromised home routers.

The vast majority of the open source/hobbyist made Firefox extensions
- those that are hosted at https://addons.mozilla.org - are not
vulnerable to this attack. Users of popular Firefox extensions such as
NoScript, Greasemonkey, and AdBlock Plus have nothing to worry about.

In addition to notifying the Firefox Security Team, some of the most
high-profile vulnerable software vendors (Google, Yahoo, and Facebook)
were notified 45 days ago, although none have yet released a fix. The
number of vulnerable extensions is more lengthy than those listed in
this document. Until vendors have fixed the problems, users should
remove/disable all Firefox extensions except those that they are sure
they have downloaded from the official Firefox Add-ons website
(https://addons.mozilla.org). If in doubt, delete the extension, and
then download it again from a safe place.

In Firefox, this can be done by going to Tools->Add-ons. Select the
individual extensions, and then click on the uninstall button.


Frequently Asked Questions


Q: Who is at risk?

A: Anyone who has installed the Firefox Web Browser and one or more
vulnerable extensions. These include, but are not limited to: Google
Toolbar, Google Browser Sync, Yahoo Toolbar, Del.icio.us Extension,
Facebook Toolbar, AOL Toolbar, Ask.com Toolbar, LinkedIn Browser
Toolbar, Netcraft Anti-Phishing Toolbar, PhishTank SiteChecker.

Q: How many people are at risk?

A: Millions. Exact numbers for each toolbar/extension are not released
by the vendors. Google Toolbar, which is one of the most popular of
the vulnerable extensions, is installed as part of the download
process with WinZip, RealNetworks' Real Player and Adobe's Shockwave.
Google publicly pays website publishers $1 for each copy of Firefox +
Google Toolbar that customers download and install through a
publisher's website.

Google confirmed in 2005 that their toolbar product's user base was
"in the millions". Given the number of distribution deals that have
been signed, the number of users can only have grown in size since.

Q: When am I at risk?

A: When you use a public wireless network, an untrusted Internet
connection, or a wireless home router with the default password set.

Q: What can happen to me?

A: An attacker can covertly install malicious software that will run
within your web browser. Such software could spy on the you, hijack
e-banking sessions, steal emails, send email spam and a number of
other nasty tasks.

Q: What can I do to reduce my risk?

A: Users with wireless home routers should change their password to
something other than the default.

Until the vendors release secure updates to their software, users
should remove or disable all Firefox extensions and toolbars. Only
those that have been downloaded from the official Firefox Add-Ons page
are safe.

In Firefox, this can be done by going to the Tools menu and choose the
Add-ons item. Select the individual extensions, and then click on the
uninstall button.

Q: Why is this attack possible?

A: The problem stems from design flaws, false assumptions, and a lack
of solid developer documentation instructing extension authors on the
best way to secure their code.

The nature of the vulnerability described in this report is technical,
but its impact can be limited by appropriate user configuration. This
shows the relation between the technical and social aspects of
security. For numerous other examples, please see the publications
listed at www.stop-phishing.com. It also illustrates the need for good
education of typical Internet users. This has been recognized as a
difficult problem to tackle, but some recent efforts, e.g.,
www.SecurityCartoon.com look promising.

--
Description Of Vulnerability
--