First published: Mon Feb 28 2005(Updated: )
Firefox before 1.0.1 allows remote attackers to spoof the (1) security and (2) download modal dialog boxes, which could be used to trick users into executing script or downloading and executing a file, aka "Firespoofing."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =0.8 | |
Mozilla Firefox | =0.9.1 | |
Mozilla Firefox | =0.10.1 | |
Mozilla Firefox | =0.9 | |
Mozilla Firefox | =1.0 | |
Mozilla Firefox | =0.9.3 | |
Mozilla Firefox | =0.9.2 | |
Mozilla Firefox | =0.9-rc | |
Mozilla Firefox | =0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0591 is considered a high severity vulnerability as it allows remote attackers to spoof critical dialog boxes.
To fix CVE-2005-0591, users should upgrade to Firefox version 1.0.1 or later.
CVE-2005-0591 affects Firefox versions 0.8 to 1.0, inclusive.
CVE-2005-0591 enables attackers to execute script or download harmful files by spoofing security dialogs.
There is no official workaround for CVE-2005-0591; upgrading is the recommended solution.