Vulnerability Name:

CVE-2005-4678 (CCN-19236)

Assigned:2005-02-07
Published:2005-02-07
Updated:2008-09-05
Summary:Apple Safari 2.0.2 (aka 416.12) allows remote attackers to spoof the URL in the status bar via the title in an image in a link to a trusted site within a form to the malicious site.
Note: the provenance of this information is unknown; the details are obtained solely from third party information.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: MITRE
Type: CNA
CVE-2005-0233

Source: MITRE
Type: CNA
CVE-2005-0234

Source: MITRE
Type: CNA
CVE-2005-0235

Source: MITRE
Type: CNA
CVE-2005-0236

Source: MITRE
Type: CNA
CVE-2005-0237

Source: MITRE
Type: CNA
CVE-2005-0238

Source: MITRE
Type: CNA
CVE-2005-4678

Source: CCN
Type: RHSA-2005-176
firefox security update

Source: CCN
Type: RHSA-2005-325
kdelibs security update

Source: CCN
Type: RHSA-2005-384
Mozilla security update

Source: CCN
Type: SA14162
KDE Applications IDN Spoofing Security Issue

Source: CCN
Type: SA17618
Safari Image Control Status Bar Spoofing Weakness

Source: SECUNIA
Type: Vendor Advisory
17618

Source: CCN
Type: CIAC INFORMATION BULLETIN P-149
Firefox Security Update

Source: CCN
Type: CIAC INFORMATION BULLETIN P-156
Apple Security Update 2005-003

Source: CCN
Type: CIAC INFORMATION BULLETIN P-159
kdelibs Security Update

Source: CCN
Type: GLSA-200503-10
Mozilla Firefox: Various vulnerabilities

Source: CCN
Type: GLSA-200503-30
Mozilla Suite: Multiple vulnerabilities

Source: CCN
Type: US-CERT VU#273262
Multiple web browsers vulnerable to spoofing via Internationalized Domain Name support

Source: CCN
Type: OSVDB ID: 20957
Apple Safari Image Control Title Attribute Status Bar Spoofing

Source: CCN
Type: OSVDB ID: 61029
Omniweb International Domain Name (IDN) Punycode Encoded Domain Name Spoofing

Source: CCN
Type: OSVDB ID: 61030
Opera International Domain Name (IDN) Punycode Encoded Domain Name Spoofing

Source: CCN
Type: OSVDB ID: 61031
Apple Safari International Domain Name (IDN) Punycode Encoded Domain Name Spoofing

Source: CCN
Type: OSVDB ID: 61032
Epiphany International Domain Name (IDN) Punycode Encoded Domain Name Spoofing

Source: CCN
Type: BID-12461
Multiple Web Browser International Domain Name Handling Site Property Spoofing Vulnerabilities

Source: CCN
Type: BID-12470
Multiple Mozilla Browser enable.IDN Setting Weakness

Source: CCN
Type: USN-149-3
Ubuntu 4.10 update for Firefox vulnerabilities

Source: XF
Type: UNKNOWN
multiple-browsers-idn-spoof(19236)

Source: SUSE
Type: SUSE-SA:2005:016
Mozilla Firefox: remote code execution

Source: SUSE
Type: SUSE-SA:2005:022
kdelibs3: various KDE security problems

Source: SUSE
Type: SUSE-SA:2005:031
Opera: various problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apple:safari:2.0.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:netscape:navigator:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:kde:konqueror:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:omnigroup:omniweb:5.1:563.34:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:epiphany:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple safari 2.0.2
    mozilla mozilla 1.6
    netscape navigator 7.2
    mozilla firefox 1.0
    kde konqueror 3.2.2
    omnigroup omniweb 5.1 563.34
    apple safari 1.2.5
    gnome epiphany *
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    suse suse linux 8.2
    suse suse linux 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux 10.0
    suse suse linux 9.1
    redhat enterprise linux 3
    suse suse linux 9.2
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    suse linux enterprise server 9
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux 10.0
    suse suse linux 9.3