Vulnerability Name:

CVE-2005-1576 (CCN-21293)

Assigned:2005-05-12
Published:2005-05-12
Updated:2008-09-05
Summary:The file download dialog in Mozilla Firefox 0.10.1 and 1.0 for Windows uses the Content-Type HTTP header to determine the file type, but saves the original file extension when "Save to Disk" is selected, which allows remote attackers to hide the real file types of downloaded files.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: MITRE
Type: CNA
CVE-2005-1576

Source: CCN
Type: SA12979
Mozilla Firefox Download Dialog Spoofing Vulnerabilities

Source: SECUNIA
Type: Exploit, Patch, Vendor Advisory
12979

Source: MISC
Type: Exploit, Patch, Vendor Advisory
http://secunia.com/secunia_research/2004-11/advisory/

Source: CCN
Type: Mozilla Firefox Download Web page
Firefox - Rediscover the web

Source: OSVDB
Type: Exploit, Vendor Advisory
16432

Source: CCN
Type: OSVDB ID: 16432
Mozilla Firefox Content-Type Header "Save to Disk" File Extension Spoofing

Source: XF
Type: UNKNOWN
mozilla-contentheader-spoof(21293)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mozilla firefox 0.10.1
    mozilla firefox 1.0
    mozilla firefox 0.10.1
    mozilla firefox 1.0