CVE-2005-0238

The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Exploit Vendor Advisory
http://www.securityfocus.com/bid/12461 Broken Link Third Party Advisory VDB Entry
http://www.shmoo.com/idn Broken Link Exploit Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link Exploit Vendor Advisory
https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 Broken Link Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory VDB Entry
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html Exploit Vendor Advisory
http://www.securityfocus.com/bid/12461 Broken Link Third Party Advisory VDB Entry
http://www.shmoo.com/idn Broken Link Exploit Vendor Advisory
http://www.shmoo.com/idn/homograph.txt Broken Link Exploit Vendor Advisory
https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 Broken Link Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:camino:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*
cpe:2.3:a:omnigroup:omniweb:5:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Exploit, Vendor Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031459.html - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory () http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory
References () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory () http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory
References () https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry

28 Feb 2022, 17:54

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*
References (MISC) http://www.shmoo.com/idn/homograph.txt - Exploit, Vendor Advisory (MISC) http://www.shmoo.com/idn/homograph.txt - Broken Link, Exploit, Vendor Advisory
References (MISC) http://www.shmoo.com/idn - Exploit, Vendor Advisory (MISC) http://www.shmoo.com/idn - Broken Link, Exploit, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/19236 - Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/12461 - (BID) http://www.securityfocus.com/bid/12461 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Patch, Vendor Advisory (CONFIRM) https://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 - Broken Link, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0238

Mitre link : CVE-2005-0238

CVE.ORG link : CVE-2005-0238


JSON object : View

Products Affected

mozilla

  • mozilla
  • camino

gnome

  • epiphany

opera

  • opera_browser

omnigroup

  • omniweb