Check Point Advisories

Mozilla Firefox IconURL Arbitrary JavaScript Execution - Ver2 (CVE-2005-1477)

Check Point Reference: CPAI-2014-1047
Date Published: 3 Mar 2014
Severity: Medium
Last Updated: Monday 03 March, 2014
Source: CVE-2005-1477
Industry Reference:CVE-2005-1477
Protection Provided by:

Security Gateway
R77, R76, R75

Who is Vulnerable?
Vulnerability Description Mozilla web browsers implement an extension scheme that makes it possible for developers to produce extensions for the browser. The extension scheme also implements a well defined, standard installation procedure which enables quick installations of new browser extensions. The installation of such extensions is limited to specific trusted sites that are defined in the browser preferences. Two such trusted sites are defined by default, addons.mozilla.org and update.mozilla.org. Any additional sites are added at the user's own discretion. A site which is not present in this list of trusted sites will be unable to install new extensions for the web browser. There exists a vulnerability in the installer of the Mozilla web browser and its derivatives. The flaw is caused by insufficient sanitization of the IconURL parameter. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system with the privileges of the currently logged in user. In the case where the site performing the installation is trusted, either directly or through the exploitation of the IFRAME vulnerability, then the script will be executed when the user clicks the installation link. A dialogue window will be displayed confirming the installation, however, this will occur only after the JavaScript has been executed. In the case where the site performing the installation is not trusted, then the installation will be blocked by the browser. An information bar will be displayed indicating that the installation was blocked, and will allow the user to add the site to the trusted list. If the user decides to add the site to the trusted list, the installation link must be clicked again, after which the behavior outlined in the trusted case above will apply.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability

In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.

For information on how to update IPS, go to

SBP-2006-05
,
Protection tab and select the version of your choice.

Security Gateway R77 / R76 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Mozilla Firefox IconURL Arbitrary JavaScript Execution - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

SmartView Tracker will log the following entries:

Attack Name:  Content Protection Violation.
Attack Information:  Mozilla Firefox IconURL Arbitrary JavaScript Execution - Ver2

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK