|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> Mozilla/Firefox user interface spoofing Vulnerability Assessment Details
|
Mozilla/Firefox user interface spoofing |
||
Acertains the version of Mozilla/Firefox Detailed Explanation for this Vulnerability Assessment The remote host is using Mozilla and/or Firefox, an alternative web browser. This web browser supports the XUL (XML User Interface Language), a language designed to manipulate the user interface of the browser itself. Since XUL gives the full control of the browser GUI to the visited websites, a possible hacker may use it to spoof a third party website and therefore pretend that the URL and Certificates of the website are legitimate. In addition to this, the remote version of this browser is vulnerable to a flaw which may permit a malicious web site to spoof security properties such as SSL certificates and URIs. See also : http://www.nd.edu/~jsmith30/xul/test/spoof.html Solution : None at this time Network Security Threat Level: Medium Networks Security ID: 10796, 10832 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |