Korean
<< Back
VID 28632
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Mozilla Web browser, according to its version number, has multiple spoofing vulnerabilities.

1. Mozilla and Firefox Web browser may permit malicious Web pages to spoof security properties of a trusted site, such as SSL certificates and URIs.
2. Mozilla and Firefox Web browser also support the XUL (XML User Interface Language), a language designed to manipulate the user interface of the browser itself. XUL has a flaw that gives the full control of the browser GUI to the visited websites.

The attacker could exploit this spoofing flaws to steal sensitive or private information, facilitating phishing attacks.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.nd.edu/~jsmith30/xul/test/spoof.html
http://secunia.com/advisories/12188/
http://bugzilla.mozilla.org/show_bug.cgi?id=244965
http://bugzilla.mozilla.org/show_bug.cgi?id=252198

* Platforms Affected:
Mozilla Browser version 1.7.2 and earlier
Mozilla Firefox version 0.9.2 and earlier
Microsoft Windows Any version
Recommendation No upgrade or patch available as of August 2004.

Upgrade to the latest version of Mozilla, when new fixed version becomes available from the Mozilla Download Web site at http://www.mozilla.org/download.html
Related URL CVE-2004-0763,CVE-2004-0764 (CVE)
Related URL 10832,10796 (SecurityFocus)
Related URL 16796 (ISS)