Check Point Advisories

Mozilla Browsers CSS moz-binding Cross Domain Scripting (CVE-2006-0496)

Check Point Reference: CPAI-2006-182
Date Published: 11 Oct 2009
Severity: High
Last Updated: Sunday 11 October, 2009
Source:
Industry Reference:CVE-2006-0496
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description The Mozilla based web browsers are full featured web browsers which serve as popular alternatives to the Microsoft Internet Explorer. The browsers are capable of interpreting HTML, JavaScript, CSS, as well as a myriad of other popular Internet standard formats. The Mozilla based browsers are capable of interpreting the Extensible Binding Language (XBL). There exists a Cross Site Scripting vulnerability in Mozilla web browser and its derivatives. The flaw is caused by a validation error when processing malicious CSS or HTML documents containing a specially crafted "-moz-binding" property. A remote attacker may exploit this issue to execute arbitrary scripting code in the target's browser session in the context of an arbitrary site. A successful attack leveraging this vulnerability may result in HTTP cookies being stolen from the target user and arbitrary code being executed by the target's browser in the security context of an arbitrary domain. The target host will not exhibit any abnormal or suspicious behaviour during an attack.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Mozilla Browsers CSS moz-binding Cross Domain Scripting protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Web Client Enforcement Violation.
Attack Information:  Mozilla browsers CSS moz-binding cross domain scripting

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK