Lucene search

K
mozillaMozilla FoundationMFSA2006-58
HistorySep 14, 2006 - 12:00 a.m.

Auto-update compromise through DNS and SSL spoofing — Mozilla

2006-09-1400:00:00
Mozilla Foundation
www.mozilla.org
20

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.019

Percentile

88.6%

The Firefox and Thunderbird auto-update mechanism protects itself against DNS spoofing using SSL; only a site presenting a valid certificate for aus2.mozilla.org will be trusted as a source of update information. Jon Oberheide points out, however, that many users accept unverifiable self-signed certificates without much thought on “low value” sites, and this could be used as the basis of an attack on the update system.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.7
OR
mozillathunderbirdRange<1.5.0.7
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.019

Percentile

88.6%