The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows uses the Content-Type HTTP header to determine the file type, but saves the original file extension when "Save to Disk" is selected, which allows remote attackers to hide the real file types of downloaded files.
References
Link | Resource |
---|---|
http://secunia.com/advisories/12979 | Exploit Patch Vendor Advisory |
http://secunia.com/secunia_research/2004-11/advisory/ | Exploit Patch Vendor Advisory |
http://www.osvdb.org/16432 | Exploit Vendor Advisory |
http://secunia.com/advisories/12979 | Exploit Patch Vendor Advisory |
http://secunia.com/secunia_research/2004-11/advisory/ | Exploit Patch Vendor Advisory |
http://www.osvdb.org/16432 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/12979 - Exploit, Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2004-11/advisory/ - Exploit, Patch, Vendor Advisory | |
References | () http://www.osvdb.org/16432 - Exploit, Vendor Advisory |
Information
Published : 2005-05-12 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1576
Mitre link : CVE-2005-1576
CVE.ORG link : CVE-2005-1576
JSON object : View
Products Affected
mozilla
- firefox
CWE