Description
Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL "secure site" lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.
Product(s):
- Mozilla Firefox 0.10.1
- Mozilla Firefox 0.10
- Mozilla Firefox 0.8
- Mozilla Firefox 0.9.1
- Mozilla Firefox 0.9.2
- Mozilla Firefox 0.9.3
- Mozilla Firefox 0.9
- Mozilla Firefox 0.9 rc
- Mozilla Firefox 1.0
- Mozilla Firefox 1.0 Preview Release
- Mozilla Mozilla 1.3
- Mozilla Mozilla 1.4.1
- Mozilla Mozilla 1.4
- Mozilla Mozilla 1.4a
- Mozilla Mozilla Browser 1.4b
- Mozilla Mozilla 1.5.1
- Mozilla Mozilla 1.5
- Mozilla Mozilla 1.5 alpha
- Mozilla Mozilla 1.5 rc1
- Mozilla Mozilla 1.5 rc2
- Mozilla Mozilla 1.6
- Mozilla Mozilla 1.6 alpha
- Mozilla Mozilla 1.6 beta
- Mozilla Mozilla 1.7.1
- Mozilla Mozilla 1.7.2
- Mozilla Mozilla 1.7.3
- Mozilla Mozilla 1.7.5
- Mozilla Mozilla 1.7
- Mozilla Mozilla 1.7 alpha
- Mozilla Mozilla 1.7 beta
- Mozilla Mozilla 1.7 rc1
- Mozilla Mozilla 1.7 rc2
- Mozilla Mozilla 1.7 rc3
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0593, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0593 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.