ID CVE-2004-0779
Summary The (1) Mozilla 1.6, (2) Firebird 0.7 and (3) Firefox 0.8 web browsers do not properly verify that cached passwords for SSL encrypted sites are only sent via SSL encrypted sessions to the site, which allows a remote attacker to cause a cached password to be sent in cleartext to a spoofed site.
References
Vulnerable Configurations
  • cpe:2.3:a:firebirdsql:firebird:0.7
    cpe:2.3:a:firebirdsql:firebird:0.7
  • Mozilla Firefox 0.8
    cpe:2.3:a:mozilla:firefox:0.8
  • Mozilla Mozilla 1.6
    cpe:2.3:a:mozilla:mozilla:1.6
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
NASL family Mandriva Local Security Checks
NASL id MANDRAKE_MDKSA-2004-082.NASL
description A number of security vulnerabilities in mozilla are addressed by this update for Mandrakelinux 10.0 users, including a fix for frame spoofing, a fixed popup XPInstall/security dialog bug, a fix for untrusted chrome calls, a fix for SSL certificate spoofing, a fix for stealing secure HTTP Auth passwords via DNS spoofing, a fix for insecure matching of cert names for non-FQDNs, a fix for focus redefinition from another domain, a fix for a SOAP parameter overflow, a fix for text drag on file entry, a fix for certificate DoS, and a fix for lock icon and cert spoofing. Additionally, mozilla for both Mandrakelinux 9.2 and 10.0 have been rebuilt to use the system libjpeg and libpng which addresses vulnerabilities discovered in libpng (ref: MDKSA-2004:079).
last seen 2019-02-21
modified 2018-11-15
plugin id 14331
published 2004-08-22
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=14331
title Mandrake Linux Security Advisory : mozilla (MDKSA-2004:082)
refmap via4
confirm
mandrake MDKSA-2004:082
xf mozilla-plaintext-password(17018)
Last major update 18-07-2013 - 00:32
Published 18-08-2004 - 00:00
Last modified 10-07-2017 - 21:30
Back to Top