Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Numerous Security Flaws in Web Browsers

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Feb-23-05 08:54 PM
Original message
Numerous Security Flaws in Web Browsers
Numerous Security Flaws in Web Browsers Remain Unpatched

Dozens of security-related problems remain unpatched in Internet Explorer, Firefox, and Opera Web browsers. According to security solution provider Secunia who tracks vulnerabilities in over 4000 products, some of the unpatched browser vulnerabilities are considered to be either moderately or highly critical.

Secunia's reports show they're currently tracking 63 advisories for Internet Explorer 6 . Of those advisories, 41 of the problems have been either corrected or partially corrected by patches from Microsoft. One of the problems is correctable with workarounds. The remaining 21 security problems remain unpatched, the oldest of which was reported in March of 2003.

The reports show that of the 8 advisories tracked for Firefox , 6 of the problems remain unpatched while the remaining 2 have either been completely or partially corrected with patches from the Mozilla Foundation. The oldest unpatched vulnerability in Firefox is dated August 2004.

Secunia currently tracks 33 advisories for Opera 7.x, where 30 of those problems have been corrected by patches from Opera Software. The remaining 3 problems, the oldest of which is dated April 2004, remain unpatched.



http://secunia.com
Printer Friendly | Permalink |  | Top
papau Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Feb-23-05 10:09 PM
Response to Original message
1. Amazing how minor are the FireFox problems! Compared to IE - WOW!


http://secunia.com/graph/?type=cri&period=all&prod=4227

http://secunia.com/graph/?type=fro&period=all&prod=4227


Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote


Short Description:
mikx has discovered three vulnerabilities in Mozilla and Firefox, which can be exploited by malicious people to plant malware on a user's system, conduct cross-site scripting attacks, disclose sensitive information and bypass certain security restrictions. 1) Mozilla and Firefox validate an image against the "Content-Type" HTTP header, but uses the file extension from the URL when saving an image after a drag and drop event. This can e.g. be exploited to plant a valid image with an arbitrary file extension and embedded script code (e.g. .bat file) on the desktop by tricking a user into performing a certain drag and drop event.

2) Missing URI handler validation when dragging a "illegal code" URL to another tab can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an arbitrary site by tricking a user into dragging a malicious link to another tab.

3) An error in the restriction of URI handlers loaded via plugins can be exploited to link to certain restricted URIs (e.g. about:config).

This can further be exploited to trick a user into changing some sensitive configuration settings.

It is also possible to read arbitrary local files via a malicious Windows SMB share hosting specially crafted javascript code.

Spoofing
Where:
From remote


Short Description:
Eric Johanson has reported a security issue in Mozilla / Firefox / Camino / Thunderbird, which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar. which can be exploited by a malicious web site to spoof the URL displayed in the address bar, SSL certificate, and status bar.

The problem is caused due to an unintended result of the IDN (International Domain Name) implementation, which allows using international characters in domain names.

This can be exploited by registering domain names with certain international characters that resembles other commonly used characters, thereby causing the user to believe they are on a trusted site.

Solution:
Don't follow links from untrusted sources.

Manually type the URL in the address bar.


mikx has discovered a weakness in Mozilla and Mozilla Firefox, which potentially can be exploited by malicious people to trick users into performing unintended actions.
Secunia Research has discovered a vulnerability in Mozilla / Mozilla Firefox, which can be exploited by malicious people to spoof the source displayed in the Download Dialog box.
Secunia Research has reported a vulnerability in Mozilla / Mozilla Firefox, which can be exploited by malicious people to spoof the content of websites. Secunia Research has reported a vulnerability in Mozilla / Mozilla Firefox, which can be exploited by malicious people to spoof the content of websites.

The problem is that a website can inject content into another site's window if the target name of the window is known. This can e.g. be exploited by a malicious website to spoof the content of a pop-up window opened on a trusted website.

Secunia Research has discovered two vulnerabilities in Mozilla, Mozilla Firefox, and Camino, which can be exploited by malicious web sites to obtain sensitive information and spoof dialog boxes.
WESTPOINT has reported a vulnerability in Mozilla / Mozilla Firefox, which potentially can be exploited by malicious people to conduct session fixation attacks.
A vulnerability has been reported in Mozilla / Mozilla Firefox, which can be exploited by malicious people to conduct phishing attacks.


Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Dec 27th 2024, 09:27 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC