The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory | |
References | () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory | |
References | () https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry |
28 Feb 2022, 17:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:* |
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:* |
References | (MISC) http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory | |
References | (MISC) http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0238
Mitre link : CVE-2005-0238
CVE.ORG link : CVE-2005-0238
JSON object : View
Products Affected
mozilla
- mozilla
- camino
gnome
- epiphany
opera
- opera_browser
omnigroup
- omniweb
CWE