5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.02 Low
EPSS
Percentile
89.0%
Multiple web browsers are vulnerable to spoofing attacks through the use of Internationalized Domain Names. Other applications such as email programs may also be vulnerable.
The Domain Name System
The Domain Name System (DNS) provides name, address, and other information about Internet Protocol (IP) networks and devices. DNS was designed to support domain names that use a subset of the American Standard Code for Information Interchange (ASCII) character set.
Unicode
The Unicode character set contains more than 96,000 characters. Because of this, Unicode can be used to represent a wide range of languages.
Internationalized Domain Names
Internationalizing Domain Names in Applications (IDNA) is a mechanism for translating Unicode domain names into an ASCII representation that is supported by the existing DNS infrastructure. The encoding syntax used by IDNA is called Punycode (RFC 3492). A web browser that supports Internationalized Domain Names (IDN) can visit web sites that contain Unicode characters in the domain name. The request that is sent to the DNS server is encoded as Punycode, but the domain name displayed to the user is in Unicode format. Most modern web browsers support IDN. Microsoft Internet Explorer can support IDN through use of the VeriSign i-Nav plug-in.
The Problem
Many Unicode characters have a similar appearance to ASCII characters. By using a domain name that contains Unicode characters, a web site operator could make it appear that the content from his or her web site actually originated from another site. The text displayed in the browser’s address bar or status bar could be deceptive if the domain name contains Unicode characters. Other programs where the user is making a trust decision based on the appearance of a domain name may also be affected. IDNA is not limited to web browsers.
By making a malicious web site appear to be a site that the user trusts, an attacker could convince the user to provide sensitive information.
Upgrade or Patch
For vendor-specific information regarding vulnerable status and patch availability, please see the Systems Affected section of this document.
Do not follow unsolicited links
Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases, particularly if a trusted site has been compromised or allows cross-site scripting.
Check Certificates
US-CERT recommends that prior to providing any sensitive information over a secure (HTTPS) connection, you check the name recorded in the certificate to be sure that it matches the name of the site to which you think you are connecting.
273262
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: February 18, 2005 Updated: March 22, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
This issue is addressed by Apple Security Update 2005-003.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23273262 Feedback>).
Notified: February 18, 2005 Updated: March 17, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.kde.org/info/security/advisory-20050316-2.txt>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23273262 Feedback>).
Notified: February 18, 2005 Updated: March 01, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Mozilla Firefox 1.0.1 displays Internationalized Domain Names in punycode. This can help protect against spoofing.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23273262 Feedback>).
Notified: February 18, 2005 Updated: February 18, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23273262 Feedback>).
Updated: August 01, 2005
Affected
In Red Hat Enterprise Linux 2.1 and 3 this issue affected the Mozilla
browser. New mozilla packages along with our advisory are available at
the URL below and by using the Red Hat Network ‘up2date’ tool.
<http://rhn.redhat.com/errata/RHSA-2005-384.html>
In Red Hat Enterprise Linux 4 this issue affected the Firefox and
Konqeuror browsers. New kdelibs and firefox packages along with our
advisory are available at the URLs below and by using the Red Hat Network
‘up2date’ tool.
<http://rhn.redhat.com/errata/RHSA-2005-176.html>
<http://rhn.redhat.com/errata/RHSA-2005-325.html>
The vendor has not provided us with any further information regarding this vulnerability.
Notified: February 18, 2005 Updated: February 18, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Verisign provides a plug-in for Internet Explorer that provides IDN support.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23273262 Feedback>).
Notified: February 18, 2005 Updated: February 18, 2005
Unknown
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Internet Explorer does not support IDN natively, but a plug-in is available from Verisign.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23273262 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was publicly disclosed by Evgeniy Gabrilovich and Alex Gontmakher.
This document was written by Will Dormann.
CVE IDs: | CVE-2005-0234 |
---|---|
Severity Metric: | 2.36 Date Public: |
docs.info.apple.com/article.html?artnum=301061
secunia.com/multiple_browsers_idn_spoofing_test/
unicode.org/reports/tr36/#international_domain_names
www.apps.ietf.org/rfc/rfc3490.html
www.apps.ietf.org/rfc/rfc3492.html
www.cs.technion.ac.il/~gabr/papers/homograph.html
www.icann.org/committees/idn/idn-codepoint-paper.htm
www.icann.org/topics/idn.html
www.kde.org/info/security/advisory-20050316-2.txt
www.nic.ac/idnfaq.html
www.osvdb.org/displayvuln.php?osvdb_id=13578
www.shmoo.com/idn/
bugzilla.mozilla.org/show_bug.cgi?id=279099