First published: Mon Feb 07 2005(Updated: )
The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opera software Opera web browser | =7.54 | |
Mozilla Firefox | =1.0 | |
Mozilla Camino | =0.8.5 | |
OmniGroup OmniWeb | =5 | |
Opera | <=7.54 | |
Mozilla Mozilla | <1.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0233 is classified as a medium severity vulnerability due to its potential for domain spoofing.
To fix CVE-2005-0233, update affected software to the latest version that mitigates the issue.
CVE-2005-0233 impacts Mozilla Firefox 1.0, Camino 0.8.5, and older versions of Opera and Mozilla.
CVE-2005-0233 exploits domain names by allowing attackers to use homograph characters in punycode encoded domain names.
The impact of CVE-2005-0233 on users includes the risk of falling victim to phishing attacks through spoofed domain names.