Overview
Mozilla Firefox does not properly enforce domain restrictions on content sent by external applications, allowing a remote attacker to execute code on a vulnerable system.
Description
Mozilla Firefox can accept links from external applications, such as Flash and Quicktime. When such an application attempts to open a link, it is sent to the default web browser. The default configuration for Firefox is to open links from other applications in the most recent tab or window. When Firefox receives a javascript: URI from an external application, it will execute within the security context of the page currently displayed by the browser, thus creating a cross-domain violation. If Firefox is displaying a privileged chrome: URI, then the external application could cause Firefox to execute arbitrary code. |
Impact
By convincing a user to open a specially crafted media file, an attacker may be able to execute arbitrary code on a vulnerable system. Other applications that have the ability to send URIs to Firefox may also be used to trigger the vulnerability. Additional impacts are similar to cross-site scripting attacks, as described in CERT Advisory CA-2000-02. |
Solution
Upgrade |
Netscape 8 is configured by default to open external links in new tabs, which prevents exploitation of this vulnerability. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported in Mozilla Foundation Security Advisory 2005-53. Mozilla credits Michael Krax for providing information regarding this issue.
This document was written by Jeff Gennari and Will Dormann.
Other Information
CVE IDs: | CVE-2005-2267 |
Severity Metric: | 8.02 |
Date Public: | 2005-07-13 |
Date First Published: | 2005-08-02 |
Date Last Updated: | 2005-08-15 12:50 UTC |
Document Revision: | 51 |