The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Secunia Research: Mozilla Thunderbird Attachment Spoofing


<< Previous INDEX Search src / Print Next >>
Subject: Secunia Research: Mozilla Thunderbird Attachment Spoofing
        Vulnerability
From: Secunia Research <vuln@secunia.com.>
Reply-To: [email protected]
To: [email protected]
Cc: [email protected]
Content-Type: text/plain
Organization: Secunia
Date: Tue, 17 Jan 2006 10:32:48 +0100
Message-Id: <1137490368.31136.169.camel@ts2.intnet.>
Mime-Version: 1.0
X-Mailer: Evolution 2.0.2 (2.0.2-22) 
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru



Secunia Research 17/01/2006 - Mozilla Thunderbird Attachment Spoofing Vulnerability -
Table of Contents Affected Software....................................................1 Severity.............................................................2 Description of Vulnerability.........................................3 Solution.............................................................4 Time Table...........................................................5 Credits..............................................................6 References...........................................................7 About Secunia........................................................8 Verification.........................................................9
1) Affected Software Mozilla Thunderbird versions 1.0.2, 1.0.6, and 1.0.7 for Microsoft Windows. Other versions may also be affected.
2) Severity Rating: Less critical Impact: Spoofing System access Where: From remote
3) Description of Vulnerability Secunia Research has discovered a vulnerability in Thunderbird, which can be exploited by malicious people to trick users into executing arbitrary programs. The vulnerability is caused due to attachments not being displayed correctly in mails. This can be exploited to spoof the file extension and the associated file type icon via a combination of overly long filenames containing whitespaces and "Content-Type" headers not matching the file extension. Successful exploitation may lead to malware being saved to e.g. the desktop. NOTE: Attachments can be saved by dragging the attachment, or using the "Save As..." or "Save All..." functionality. For files on the desktop the icon can be spoofed if it e.g. is a ".exe" or ".lnk" file. The vulnerability has been confirmed in versions 1.0.2, 1.0.6, and 1.0.7 for Microsoft Windows. Other versions may also be affected.
4) Solution Update to version 1.5. http://www.mozilla.com/thunderbird/
5) Time Table 01/07/2005 - Initial vendor notification. 10/07/2005 - Vendor confirms the vulnerability. 27/07/2005 - Vulnerability fixed in the CVS repository. 12/01/2006 - Thunderbird 1.5 released. 17/01/2006 - Public disclosure.
6) Credits Discovered by Andreas Sandblad, Secunia Research.
7) References https://bugzilla.mozilla.org/show_bug.cgi?id=300246
8) About Secunia Secunia collects, validates, assesses, and writes advisories regarding all the latest software vulnerabilities disclosed to the public. These advisories are gathered in a publicly available database at the Secunia web site: http://secunia.com/ Secunia offers services to our customers enabling them to receive all relevant vulnerability information to their specific system configuration. Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/
9) Verification Please verify this advisory by visiting the Secunia web site: http://secunia.com/secunia_research/2005-22/advisory/ Complete list of vulnerability reports released by Secunia Research: http://secunia.com/secunia_research/

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру