Check Point Reference: | CPAI-2006-182 |
Date Published: | 11 Oct 2009 |
Severity: | High |
Last Updated: | Sunday 11 October, 2009 |
Source: | |
Industry Reference: | CVE-2006-0496 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Mozilla based web browsers are full featured web browsers which serve as popular alternatives to the Microsoft Internet Explorer. The browsers are capable of interpreting HTML, JavaScript, CSS, as well as a myriad of other popular Internet standard formats. The Mozilla based browsers are capable of interpreting the Extensible Binding Language (XBL). There exists a Cross Site Scripting vulnerability in Mozilla web browser and its derivatives. The flaw is caused by a validation error when processing malicious CSS or HTML documents containing a specially crafted "-moz-binding" property. A remote attacker may exploit this issue to execute arbitrary scripting code in the target's browser session in the context of an arbitrary site. A successful attack leveraging this vulnerability may result in HTTP cookies being stolen from the target user and arbitrary code being executed by the target's browser in the security context of an arbitrary domain. The target host will not exhibit any abnormal or suspicious behaviour during an attack. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Mozilla browsers CSS moz-binding cross domain scripting