what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 11978

Secunia Security Advisory 11978
Posted Jul 1, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A 6 year old vulnerability has been discovered in multiple browsers, allowing malicious people to spoof the content of websites. The problem is that the browsers do not check if a target frame belongs to a website containing a malicious link, which therefore does not prevent one browser window from loading content in a named frame in another window. Successful exploitation allows a malicious website to load arbitrary content in an arbitrary frame in another browser window owned by e.g. a trusted site. Affected browsers: Safari 1.x, Opera 5-7.x, Netscape 6-7.x, Mozilla Firefox 0.x, Mozilla 0-1.6, Konqueror 3.x, and Internet Explorer 5.x for Mac.

tags | advisory, arbitrary, spoof
SHA-256 | fb629750ab3d15674f76f3960bdef832ef7bc42602c49e107817ae08c89f9591

Secunia Security Advisory 11978

Change Mirror Download

TITLE:
Multiple Browsers Frame Injection Vulnerability

SECUNIA ADVISORY ID:
SA11978

VERIFY ADVISORY:
https://secunia.com/advisories/11978/

CRITICAL:
Moderately critical

IMPACT:
Spoofing

WHERE:
>From remote

SOFTWARE:
Safari 1.x
https://secunia.com/product/1543/
Opera 7.x
https://secunia.com/product/761/
Opera 6.x
https://secunia.com/product/81/
Opera 5.x
https://secunia.com/product/82/
Netscape 7.x
https://secunia.com/product/85/
Netscape 6.x
https://secunia.com/product/84/
Mozilla Firefox 0.x
https://secunia.com/product/3256/
Mozilla 1.6
https://secunia.com/product/3101/
Mozilla 1.5
https://secunia.com/product/2478/
Mozilla 1.4
https://secunia.com/product/1481/
Mozilla 1.3
https://secunia.com/product/1480/
Mozilla 1.2
https://secunia.com/product/3100/
Mozilla 1.1
https://secunia.com/product/98/
Mozilla 1.0
https://secunia.com/product/97/
Mozilla 0.x
https://secunia.com/product/772/
Konqueror 3.x
https://secunia.com/product/3166/
Internet Explorer 5.x for Mac
https://secunia.com/product/2678/

DESCRIPTION:
A 6 year old vulnerability has been discovered in multiple browsers,
allowing malicious people to spoof the content of websites.

The problem is that the browsers don't check if a target frame
belongs to a website containing a malicious link, which therefore
doesn't prevent one browser window from loading content in a named
frame in another window.

Successful exploitation allows a malicious website to load arbitrary
content in an arbitrary frame in another browser window owned by e.g.
a trusted site.

Secunia has constructed a test, which can be used to check if your
browser is affected by this issue:
https://secunia.com/multiple_browsers_frame_injection_vulnerability_test/

The vulnerability has been confirmed in the following browsers:
* Opera 7.51 for Windows
* Opera 7.50 for Linux
* Mozilla 1.6 for Windows
* Mozilla 1.6 for Linux
* Mozilla Firebird 0.7 for Linux
* Mozilla Firefox 0.8 for Windows
* Netscape 7.1 for Windows
* Internet Explorer for Mac 5.2.3
* Safari 1.2.2
* Konqueror 3.1-15redhat

Other versions may also be affected.

The vulnerability also affects Internet Explorer:
SA11966

SOLUTION:
Do not browse untrusted sites while browsing trusted sites.

The following browsers are not affected:
* Mozilla Firefox 0.9 for Windows
* Mozilla Firefox 0.9.1 for Windows
* Mozilla 1.7 for Windows
* Mozilla 1.7 for Linux

PROVIDED AND/OR DISCOVERED BY:
Reported in Mozilla browser by:
Gary McKay

OTHER REFERENCES:
SA11966:
https://secunia.com/advisories/11966/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
https://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close