Vulnerability Name: CVE-2005-0238 (CCN-19236) Assigned: 2005-02-07 Published: 2005-02-07 Updated: 2022-02-28 Summary: The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Data Manipulation References: Source: MITRE Type: CNACVE-2005-0233 Source: MITRE Type: CNACVE-2005-0234 Source: MITRE Type: CNACVE-2005-0235 Source: MITRE Type: CNACVE-2005-0236 Source: MITRE Type: CNACVE-2005-0237 Source: MITRE Type: CNACVE-2005-0238 Source: MITRE Type: CNACVE-2005-4678 Source: FULLDISC Type: Exploit, Vendor Advisory20050206 state of homograph attacks Source: CCN Type: RHSA-2005-176firefox security update Source: CCN Type: RHSA-2005-325kdelibs security update Source: CCN Type: RHSA-2005-384Mozilla security update Source: CCN Type: SA14162KDE Applications IDN Spoofing Security Issue Source: CCN Type: SA17618Safari Image Control Status Bar Spoofing Weakness Source: CCN Type: CIAC INFORMATION BULLETIN P-149Firefox Security Update Source: CCN Type: CIAC INFORMATION BULLETIN P-156Apple Security Update 2005-003 Source: CCN Type: CIAC INFORMATION BULLETIN P-159kdelibs Security Update Source: CCN Type: GLSA-200503-10Mozilla Firefox: Various vulnerabilities Source: CCN Type: GLSA-200503-30Mozilla Suite: Multiple vulnerabilities Source: CCN Type: US-CERT VU#273262Multiple web browsers vulnerable to spoofing via Internationalized Domain Name support Source: CCN Type: OSVDB ID: 20957Apple Safari Image Control Title Attribute Status Bar Spoofing Source: CCN Type: OSVDB ID: 61029Omniweb International Domain Name (IDN) Punycode Encoded Domain Name Spoofing Source: CCN Type: OSVDB ID: 61030Opera International Domain Name (IDN) Punycode Encoded Domain Name Spoofing Source: CCN Type: OSVDB ID: 61031Apple Safari International Domain Name (IDN) Punycode Encoded Domain Name Spoofing Source: CCN Type: OSVDB ID: 61032Epiphany International Domain Name (IDN) Punycode Encoded Domain Name Spoofing Source: BID Type: Broken Link, Third Party Advisory, VDB Entry12461 Source: CCN Type: BID-12461Multiple Web Browser International Domain Name Handling Site Property Spoofing Vulnerabilities Source: CCN Type: BID-12470Multiple Mozilla Browser enable.IDN Setting Weakness Source: MISC Type: Broken Link, Exploit, Vendor Advisoryhttp://www.shmoo.com/idn Source: MISC Type: Broken Link, Exploit, Vendor Advisoryhttp://www.shmoo.com/idn/homograph.txt Source: CCN Type: USN-149-3Ubuntu 4.10 update for Firefox vulnerabilities Source: CONFIRM Type: Broken Link, Issue Tracking, Patch, Third Party Advisoryhttps://bugzilla.redhat.com/beta/show_bug.cgi?id=147399 Source: XF Type: Third Party Advisory, VDB Entrymultiple-browsers-idn-spoof(19236) Source: XF Type: UNKNOWNmultiple-browsers-idn-spoof(19236) Source: SUSE Type: SUSE-SA:2005:016Mozilla Firefox: remote code execution Source: SUSE Type: SUSE-SA:2005:022kdelibs3: various KDE security problems Source: SUSE Type: SUSE-SA:2005:031Opera: various problems Vulnerable Configuration: Configuration 1 :cpe:/a:gnome:epiphany:*:*:*:*:*:*:*:* OR cpe:/a:mozilla:camino:0.8.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla:*:*:*:*:*:*:*:* (Version <= 1.6) OR cpe:/a:omnigroup:omniweb:5:*:*:*:*:*:*:* OR cpe:/a:opera:opera_browser:*:*:*:*:*:*:*:* (Version <= 7.54) Configuration CCN 1 :cpe:/a:mozilla:mozilla:1.6:*:*:*:*:*:*:* OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:* OR cpe:/a:kde:konqueror:3.2.2:*:*:*:*:*:*:* OR cpe:/a:omnigroup:omniweb:5.1:563.34:*:*:*:*:*:* OR cpe:/a:apple:safari:1.2.5:*:*:*:*:*:*:* OR cpe:/a:gnome:epiphany:*:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
gnome epiphany *
mozilla camino 0.8.5
mozilla mozilla *
omnigroup omniweb 5
opera opera browser *
mozilla mozilla 1.6
netscape navigator 7.2
mozilla firefox 1.0
kde konqueror 3.2.2
omnigroup omniweb 5.1 563.34
apple safari 1.2.5
gnome epiphany *
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 8.2
suse suse linux 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux 10.0
suse suse linux 9.3