You are currently viewing a snapshot of www.mozilla.org taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to www.mozilla.org, please file a bug.



You are here: Known Vulnerabilities in Mozilla Products (Firefox 1.0.1) > MFSA 2005-23

Mozilla Foundation Security Advisory 2005-23

Title: Download dialog source spoofing
Severity: Low
Risk: Low
Reporter: Jakob Balle (Secunia)
Products: Firefox, Mozilla Suite

Fixed in: Firefox 1.0.1
  Mozilla Suite 1.7.6

Description

The true source of a download can be disguised by using a host name long enough that the most significant parts are truncated. Spoofing can be made even more convincing on windows if the subdomain labels contain a string of non-breaking space characters.

Workaround

Do not download files from untrusted sites. Be suspicious if the download dialog shows the file comes from a different site than the one you are on. If the download source is a trusted one visit that site yourself to get the file by typing the address into the location bar rather than trust 3rd-party links to content.

References