HTTP: Firefox IconURL JavaScript Injection

This signature detects attempts to exploit a known vulnerability in Firefox Web browser. Attackers can create a malicious Web page that, when viewed in a browser, executes arbitrary Javascript code within the context of Chrome.

Extended Description

Mozilla Firefox is prone to a security vulnerability that could result in the execution of arbitrary code without requiring user interaction. Initial analysis of the vulnerability reveals that the it relies on a three-stage attack that may lead to an arbitrary script gaining 'UniversalXPConnect' privileges. A remote atacker may be able to exploit this issue to take arbitrary actions on the vulnerable computer in the context of the user that is running the affcted browser. This vulnerability is reported in all versions of Mozilla Firefox browsers up to 1.0.3. To be exploitable, a site listed in a victim user's configuration to allow extension installation must be prone to a cross-site scripting vulnerability. By default, 'update.mozilla.org' and 'addon.mozilla.org' are both listed as trusted sites for extension installation. *Update: The cross-site scripting vulnerability that the publicly available exploit relied on in the mozilla.org domain has been fixed. This issue is no longer exploitable through this public attack vector.

Affected Products

Mozilla browser

Short Name
HTTP:STC:MOZILLA:ICONURL-JS
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2005-1477 Firefox IconURL Injection JavaScript bid:13544
Release Date
05/27/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Sco

Suse

Hp

Mozilla

Sgi

Ubuntu

Netscape

CVSS Score

5.1

Found a potential security threat?