Lucene search

K
certThor LarholmVU:358017
HistoryJul 11, 2007 - 12:00 a.m.

Mozilla Firefox URL protocol handling vulnerability

2007-07-1100:00:00
Thor Larholm
www.kb.cert.org
24

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.228 Low

EPSS

Percentile

96.5%

Overview

Mozilla Firefox protocol handlers may allow remotely supplied JavaScript to execute with elevated privileges. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

On Microsoft Windows systems, Mozilla Firefox installs protocol handlers for Mozilla-specific protocols, such as the FirefoxURL and FirefoxHTML protocols. If Microsoft Windows encounters a URL protocol it cannot handle natively it searches the Windows registry for the appropriate protocol handler. When the correct protocol handler is found, Windows passes it the URL string. By design Windows passes the URL string to the protocol handler as it was received without performing any sanitization.

Mozilla Firefox URL protocol handlers are constructed in a way that may allow a remote attacker to execute arbitrary JavaScript with elevated (chrome) privileges. Mozilla Firefox security restrictions detect and prevent the execution of such JavaScript. However, if a remote attacker can persuade a user with Firefox installed to access a specially crafted web page using Internet Explorer, and perhaps other Windows applications, the malicious JavaScript will be executed. Reports claim this vulnerability is introduced when Firefox versions 2.0.0.2 and later are installed.

Exploit code is publicly available for this vulnerability.


Impact

This vulnerability may allow a remote, unauthenticated attacker to execute JavaScript with elevated (chrome) privileges. This essentially means that the attacker can execute arbitrary code with the privileges of the user.


Solution

Update
Mozilla has addressed this vulnerability in Firefox 2.0.0.5.


Unregister theFirefoxprotocols

Disabling the Mozilla Firefox protocol handlers will mitigate this vulnerability. To unregister the protocol handlers, delete or rename the following registry keys:

HKEY_CLASSES_ROOT\FirefoxURL
HKEY_CLASSES_ROOT\FirefoxHTML
Modifying the Windows registry may have unintended consequences and should be done with care.


Vendor Information

358017

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Updated: July 18, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to <http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23358017 Feedback>).

Microsoft Corporation Unknown

Updated: July 10, 2007

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly disclosed by Thor Larholm.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2007-3670
Severity Metric: 19.69 Date Public:

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.228 Low

EPSS

Percentile

96.5%