CVE-2005-1156
CVSS7.5
发布时间 :2005-05-02 00:00:00
修订时间 :2010-08-21 00:27:57
NMCOS    

[原文]Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."


[CNNVD]Firefox跨站脚本执行漏洞(CNNVD-200505-126)

        Firefox中的搜索插件技术基于Apple的sherlock文件。这些文件的安装程序和解析程序中存在漏洞,可能允许创建用作间谍软件和/或执行任意代码载体的搜索引擎。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:firefox:0.9Mozilla Firefox 0.9
cpe:/a:mozilla:mozilla:1.5.1Mozilla Mozilla 1.5.1
cpe:/a:mozilla:mozilla:1.7Mozilla Mozilla 1.7
cpe:/a:mozilla:mozilla:1.5Mozilla Mozilla 1.5
cpe:/a:netscape:navigator:7.2Netscape Navigator 7.2
cpe:/a:mozilla:firefox:0.9.2Mozilla Firefox 0.9.2
cpe:/a:mozilla:firefox:0.10Mozilla Firefox 0.10
cpe:/a:mozilla:mozilla:1.7.6Mozilla Mozilla 1.7.6
cpe:/a:mozilla:mozilla:1.5:rc1Mozilla Mozilla 1.5 rc1
cpe:/a:mozilla:mozilla:1.7.3Mozilla Mozilla 1.7.3
cpe:/a:mozilla:mozilla:1.7.1Mozilla Mozilla 1.7.1
cpe:/a:mozilla:firefox:0.8Mozilla Firefox 0.8
cpe:/a:mozilla:mozilla:1.4:alphaMozilla Mozilla 1.4a
cpe:/a:mozilla:mozilla:1.3Mozilla Mozilla 1.3
cpe:/a:mozilla:mozilla:1.4.1Mozilla Mozilla 1.4.1
cpe:/a:mozilla:mozilla:1.6:betaMozilla Mozilla 1.6 beta
cpe:/a:mozilla:mozilla:1.7:rc3Mozilla Mozilla 1.7 rc3
cpe:/a:mozilla:mozilla:1.7:alphaMozilla Mozilla 1.7 alpha
cpe:/a:mozilla:firefox:0.10.1Mozilla Firefox 0.10.1
cpe:/a:mozilla:mozilla:1.7.2Mozilla Mozilla 1.7.2
cpe:/a:mozilla:mozilla:1.7:rc1Mozilla Mozilla 1.7 rc1
cpe:/a:mozilla:mozilla:1.4Mozilla Mozilla 1.4
cpe:/a:mozilla:mozilla:1.6:alphaMozilla Mozilla 1.6 alpha
cpe:/a:mozilla:firefox:1.0.1Mozilla Firefox 1.0.1
cpe:/a:mozilla:firefox:1.0.2Mozilla Firefox 1.0.2
cpe:/a:mozilla:mozilla:1.5:rc2Mozilla Mozilla 1.5 rc2
cpe:/a:mozilla:mozilla:1.7:betaMozilla Mozilla 1.7 beta
cpe:/a:mozilla:mozilla:1.7.5Mozilla Mozilla 1.7.5
cpe:/a:mozilla:mozilla:1.6Mozilla Mozilla 1.6
cpe:/a:mozilla:firefox:0.9.1Mozilla Firefox 0.9.1
cpe:/a:mozilla:mozilla:1.7:rc2Mozilla Mozilla 1.7 rc2
cpe:/a:mozilla:firefox:1.0Mozilla Firefox 1.0
cpe:/a:mozilla:firefox:0.9.3Mozilla Firefox 0.9.3
cpe:/a:mozilla:firefox:0.9:rcMozilla Firefox 0.9 rc
cpe:/a:mozilla:mozilla:1.5:alphaMozilla Mozilla 1.5 alpha

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11230Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new se...
oval:org.mitre.oval:def:100020Mozilla Search Plugin Cross-site Scripting Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1156
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-126
(官方数据源) CNNVD

- 其它链接及资源

https://bugzilla.mozilla.org/show_bug.cgi?id=290037
(PATCH)  CONFIRM  https://bugzilla.mozilla.org/show_bug.cgi?id=290037
http://xforce.iss.net/xforce/xfdb/20125
(PATCH)  XF  mozilla-plugin-xss(20125)
http://www.securityfocus.com/bid/13211
(PATCH)  BID  13211
http://www.redhat.com/support/errata/RHSA-2005-386.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:386
http://www.redhat.com/support/errata/RHSA-2005-383.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:383
http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200504-18
http://securitytracker.com/id?1013745
(PATCH)  SECTRACK  1013745
http://secunia.com/advisories/14996
(VENDOR_ADVISORY)  SECUNIA  14996
http://secunia.com/advisories/14992
(VENDOR_ADVISORY)  SECUNIA  14992
http://secunia.com/advisories/14938
(VENDOR_ADVISORY)  SECUNIA  14938
http://www.mozilla.org/security/announce/mfsa2005-38.html
(VENDOR_ADVISORY)  CONFIRM  http://www.mozilla.org/security/announce/mfsa2005-38.html
http://www.mikx.de/firesearching/
(UNKNOWN)  MISC  http://www.mikx.de/firesearching/
http://www.securityfocus.com/bid/15495
(UNKNOWN)  BID  15495
http://www.redhat.com/support/errata/RHSA-2005-384.html
(UNKNOWN)  REDHAT  RHSA-2005:384
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
(UNKNOWN)  SCO  SCOSA-2005.49

- 漏洞信息

Firefox跨站脚本执行漏洞
高危 访问验证错误
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        Firefox中的搜索插件技术基于Apple的sherlock文件。这些文件的安装程序和解析程序中存在漏洞,可能允许创建用作间谍软件和/或执行任意代码载体的搜索引擎。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.mozilla.org/products/" target="_blank"

- 漏洞信息

15687
Mozilla Multiple Browser Search Plugin Privileged Script Execution (Firesearching)
Vendor Verified

- 漏洞描述

- 时间线

2005-04-12 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SCO OpenServer Release 5.0.7 Maintenance Pack 4 Released - Multiple Vulnerabilities Fixed
Unknown 15495
Yes Yes
2005-11-18 12:00:00 2007-02-27 07:36:00
The vendor disclosed these vulnerabilities.

- 受影响的程序版本

SCO Open Server 5.0.7

- 漏洞讨论

Updates for the SCO OpenServer Mozilla browser have been released, addressing multiple security vulnerabilities and weaknesses.

This release fixes a number of bugs, including some security vulnerabilities and weaknesses.

Many of the bugs that have been fixed in this maintenance pack may have a security impact that may be exploited by a local or remote attacker. Possible consequences include denial of service, spoofing, gaining knowledge of potentially sensitive information, conducting cross-site scripting attacks, bypassing certain security restrictions, manipulating certain data, or compromising a user's system, and gaining local privilege escalation.

- 漏洞利用

Some of these issues do not require exploit code, some may require it, and some may have existing exploit code available.

- 解决方案

Instructions for obtaining and installing the Maintenance Pack can be found in the attached advisory.


SCO Open Server 5.0.7

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站