The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-0591 | The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long "user:pass" sequence in the URL, which appears before the real hostname. |
Ubuntu USN |
USN-149-3 | Ubuntu 4.10 update for Firefox vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T21:21:06.511Z
Reserved: 2005-02-28T00:00:00
Link: CVE-2005-0590
No data.
Status : Deferred
Published: 2005-05-02T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-0590
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN