First published: Thu Dec 27 2007(Updated: )
The Custom Button Installer dialog in Google Toolbar 4 and 5 beta presents certain domain names in the (1) "Downloaded from" and (2) "Privacy considerations" sections without verifying domain names, which makes it easier for remote attackers to spoof domain names and trick users into installing malicious button XML files, as demonstrated by presenting www.google.com when the button was downloaded from an arbitrary site through an open redirector on www.google.com.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Toolbar | =5-beta | |
Google Toolbar | =4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6536 has a severity rating that indicates it can potentially allow remote attackers to spoof domain names.
To fix CVE-2007-6536, you should upgrade to a newer version of Google Toolbar where this vulnerability is resolved.
CVE-2007-6536 affects Google Toolbar versions 4 and 5 beta.
The implications of CVE-2007-6536 include the possibility of users being tricked into installing malicious software due to spoofed domain names.
CVE-2007-6536 was discovered in 2007.