The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Mozilla Thunderbird Attachment Spoofing Vulnerability


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 19 Jan 2006 17:02:34 +0200
Subject: [NT] Mozilla Thunderbird Attachment Spoofing Vulnerability
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060119221617.068985833@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Mozilla Thunderbird Attachment Spoofing Vulnerability
------------------------------------------------------------------------


SUMMARY

Mozilla Thunderbird displays display attachments in a wrongful manner 
which allows attackers to spoof attachments and convince users to execute 
arbitrary programs.

DETAILS

Vulnerable Systems:
 * Mozilla Thunderbird version 1.0.2
 * Mozilla Thunderbird version 1.0.6
 * Mozilla Thunderbird version 1.0.7

Immune Systems:
 * Mozilla Thunderbird version 1.5

The vulnerability is caused due to attachments not being displayed 
correctly in mails. This can be exploited to spoof the file extension and 
the associated file type icon via a combination of overly long
filenames containing whitespaces and "Content-Type" headers not matching 
the file extension.

Successful exploitation may lead to malware being saved to e.g. the 
desktop.

NOTE: Attachments can be saved by dragging the attachment, or using the 
"Save As..." or "Save All..." functionality. For files on the desktop the 
icon can be spoofed if it e.g. is a ".exe" or ".lnk" file.

Disclosure Timeline:
01/07/2005 - Initial vendor notification.
10/07/2005 - Vendor confirms the vulnerability.
27/07/2005 - Vulnerability fixed in the CVS repository.
12/01/2006 - Thunderbird 1.5 released.
17/01/2006 - Public disclosure.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:vuln@secunia.com.> Secunia 
Research.
The original article can be found at:  
<http://secunia.com/secunia_research/2005-22/advisory/>; 
http://secunia.com/secunia_research/2005-22/advisory/
The bug report can be found at:  
<https://bugzilla.mozilla.org/show_bug.cgi?id=300246> 
https://bugzilla.mozilla.org/show_bug.cgi?id=300246




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру