ID CVE-2005-0233
Summary The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
Vulnerable Configurations
  • cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
    cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
  • cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
    cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2007-05-09T16:10:38.131-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Christine Walzer
      organization The MITRE Corporation
    • name Matthew Wojcik
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    description The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
    family windows
    id oval:org.mitre.oval:def:100029
    status accepted
    submitted 2005-08-16T04:00:00.000-04:00
    title Mozilla IDN Homograph Spoofing Vulnerability
    version 6
  • accepted 2013-04-29T04:12:31.569-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    description The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
    family unix
    id oval:org.mitre.oval:def:11229
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
    version 29
redhat via4
advisories
  • rhsa
    id RHSA-2005:176
  • rhsa
    id RHSA-2005:384
rpms firefox-0:1.0.1-1.4.3
refmap via4
bid 12461
bugtraq 20050208 International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs + SSL certs.
confirm http://www.mozilla.org/security/announce/mfsa2005-29.html
fulldisc 20050206 state of homograph attacks
gentoo
  • GLSA-200503-10
  • GLSA-200503-30
misc
suse SUSE-SA:2005:016
xf multiple-browsers-idn-spoof(19236)
Last major update 11-10-2017 - 01:29
Published 08-02-2005 - 05:00
Last modified 11-10-2017 - 01:29
Back to Top