Feeds

Firefox spoofing bug raises phishing fears

Basic authentication sucks

Secure remote control for conventional and virtual desktops

Flaws in the way the latest version of Mozilla Firefox presents authentication dialog boxes leave the door open for cybercrooks to trick users into handing over login credentials, a leading security researcher warns.

The spoofing weakness - discovered by Israeli security researcher Aviv Raff - involves a failure by the open source browser to sanitise single quotation marks and spaces in the "realm" value of an authentication header.

"This makes it possible for an attacker to create a specially crafted Realm value which will look as if the authentication dialog came from a trusted site," Raff explained.

Exploitation of the bug might involve embedding a rigged image on a MySpace page that would pose as a log-on dialog to Amazon.com, for example, while actually sending data to systems controlled by hackers. Alternatively, a hacker might attempt to trick users into visiting a maliciously constructed web page featuring a link to a trusted website. If a victim clicks on the link, the trusted web page will be opened in a new window. Meanwhile, in the background, a script will be executed to redirect the newly opened window to the attacker's web server, returning the specially crafted basic authentication response.

Firefox 2.0.0.11 is vulnerable to the issue, according to Raff. Previous versions of the popular open source browser may also be flawed.

Raff has posted an advisory explaining the vulnerability and its possible misuse in phishing attacks. The advisory links to a video illustrating the exploit, also created by Raff, that shows the misuse of the flaw to spoof Google Checkout. A low-resolution version of the video (as below) has been posted onto YouTube.

Mozilla researchers are investigating the issue. Pending the availability of a fix Raff, who's previously discovered vulnerabilities in Google's Toolbar and Apple's Safari web browser, advises users of the open source browser to avoid providing username and password information to sites displaying the dialog. ®

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?