Lucene search

K
mozillaMozilla FoundationMFSA2013-61
HistoryJun 25, 2013 - 12:00 a.m.

Homograph domain spoofing in .com, .net and .name — Mozilla

2013-06-2500:00:00
Mozilla Foundation
www.mozilla.org
18

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.1%

Security researcher 3ric Johanson reported in discussions with Richard Newman and Holt Sorenson that Verisign’s prevention measures for homograph attacks using Internationalized Domain Names (IDN) were insufficiently rigorous, and this led to a limited possibility for domain spoofing in Firefox.

Affected configurations

Vulners
Node
mozillafirefoxRange<22
OR
mozillaseamonkeyRange<2.19
CPENameOperatorVersion
firefoxlt22
seamonkeylt2.19

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.1%