search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple web browsers vulnerable to spoofing via Internationalized Domain Name support

Vulnerability Note VU#273262

Original Release Date: 2005-03-22 | Last Revised: 2005-08-01

Overview

Multiple web browsers are vulnerable to spoofing attacks through the use of Internationalized Domain Names. Other applications such as email programs may also be vulnerable.

Description

The Domain Name System

The Domain Name System (DNS) provides name, address, and other information about Internet Protocol (IP) networks and devices. DNS was designed to support domain names that use a subset of the American Standard Code for Information Interchange (ASCII) character set.

Unicode

The Unicode character set contains more than 96,000 characters. Because of this, Unicode can be used to represent a wide range of languages.

Internationalized Domain Names

Internationalizing Domain Names in Applications (IDNA) is a mechanism for translating Unicode domain names into an ASCII representation that is supported by the existing DNS infrastructure. The encoding syntax used by IDNA is called Punycode (RFC 3492). A web browser that supports Internationalized Domain Names (IDN) can visit web sites that contain Unicode characters in the domain name. The request that is sent to the DNS server is encoded as Punycode, but the domain name displayed to the user is in Unicode format. Most modern web browsers support IDN. Microsoft Internet Explorer can support IDN through use of the VeriSign i-Nav plug-in.

The Problem

Many Unicode characters have a similar appearance to ASCII characters. By using a domain name that contains Unicode characters, a web site operator could make it appear that the content from his or her web site actually originated from another site. The text displayed in the browser's address bar or status bar could be deceptive if the domain name contains Unicode characters. Other programs where the user is making a trust decision based on the appearance of a domain name may also be affected. IDNA is not limited to web browsers.

Impact

By making a malicious web site appear to be a site that the user trusts, an attacker could convince the user to provide sensitive information.

Solution

Upgrade or Patch
For vendor-specific information regarding vulnerable status and patch availability, please see the Systems Affected section of this document.


Do not follow unsolicited links

Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases, particularly if a trusted site has been compromised or allows cross-site scripting.

Check Certificates

US-CERT recommends that prior to providing any sensitive information over a secure (HTTPS) connection, you check the name recorded in the certificate to be sure that it matches the name of the site to which you think you are connecting.

Vendor Information

273262
 

Apple Computer Inc. Affected

Notified:  February 18, 2005 Updated: March 22, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

This issue is addressed by Apple Security Update 2005-003.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

KDE Desktop Environment Project Affected

Notified:  February 18, 2005 Updated: March 17, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see http://www.kde.org/info/security/advisory-20050316-2.txt.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Mozilla Affected

Notified:  February 18, 2005 Updated: March 01, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Mozilla Firefox 1.0.1 displays Internationalized Domain Names in punycode. This can help protect against spoofing.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Opera Software Affected

Notified:  February 18, 2005 Updated: February 18, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

US-CERT has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Red Hat Software, Inc. Affected

Updated:  August 01, 2005

Status

Affected

Vendor Statement

In Red Hat Enterprise Linux 2.1 and 3 this issue affected the Mozilla
browser. New mozilla packages along with our advisory are available at
the URL below and by using the Red Hat Network 'up2date' tool.

http://rhn.redhat.com/errata/RHSA-2005-384.html

In Red Hat Enterprise Linux 4 this issue affected the Firefox and
Konqeuror browsers. New kdelibs and firefox packages along with our
advisory are available at the URLs below and by using the Red Hat Network
'up2date' tool.

http://rhn.redhat.com/errata/RHSA-2005-176.html
http://rhn.redhat.com/errata/RHSA-2005-325.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Verisign Affected

Notified:  February 18, 2005 Updated: February 18, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Verisign provides a plug-in for Internet Explorer that provides IDN support.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Microsoft Corporation Unknown

Notified:  February 18, 2005 Updated: February 18, 2005

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Internet Explorer does not support IDN natively, but a plug-in is available from Verisign.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was publicly disclosed by Evgeniy Gabrilovich and Alex Gontmakher.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2005-0234
Severity Metric: 2.36
Date Public: 2002-02-02
Date First Published: 2005-03-22
Date Last Updated: 2005-08-01 14:29 UTC
Document Revision: 40

Sponsored by CISA.