CVE-2009-2654

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.

References

http://blog.mozilla.com/security/2009/07/28/url-bar-spoofing-vulnerability/

http://es.geocities.com/jplopezy/firefoxspoofing.html

http://osvdb.org/56717

http://secunia.com/advisories/36001

http://secunia.com/advisories/36126

http://secunia.com/advisories/36141

http://secunia.com/advisories/36435

http://secunia.com/advisories/36669

http://secunia.com/advisories/36670

http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1

http://www.debian.org/security/2009/dsa-1873

http://www.mozilla.org/security/announce/2009/mfsa2009-44.html

http://www.redhat.com/support/errata/RHSA-2009-1430.html

http://www.redhat.com/support/errata/RHSA-2009-1431.html

http://www.redhat.com/support/errata/RHSA-2009-1432.html

http://www.securityfocus.com/archive/1/505242/30/0/threaded

http://www.securityfocus.com/archive/1/505265

http://www.securityfocus.com/bid/35803

http://www.securitytracker.com/id?1022603

http://www.vupen.com/english/advisories/2009/2006

http://www.vupen.com/english/advisories/2009/2142

https://bugzilla.mozilla.org/show_bug.cgi?id=451898

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9686

https://usn.ubuntu.com/811-1/

https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00198.html

https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00261.html

Details

Source: MITRE

Published: 2009-08-03

Updated: 2018-10-03

Type: CWE-20

Risk Information

CVSS v2

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.2:beta1:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.2:beta2:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.2:beta3:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* versions up to 3.5.1 (inclusive)

Tenable Plugins

View all (26 total)

IDNameProductFamilySeverity
67924Oracle Linux 3 : seamonkey (ELSA-2009-1432)NessusOracle Linux Local Security Checks
critical
67923Oracle Linux 4 : seamonkey (ELSA-2009-1431)NessusOracle Linux Local Security Checks
critical
67922Oracle Linux 4 / 5 : firefox (ELSA-2009-1430)NessusOracle Linux Local Security Checks
critical
63402GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
60665Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64NessusScientific Linux Local Security Checks
critical
60664Scientific Linux Security Update : firefox on SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
44738Debian DSA-1873-1 : xulrunner - programming errorNessusDebian Local Security Checks
medium
41984openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-6495)NessusSuSE Local Security Checks
critical
41468SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 6433)NessusSuSE Local Security Checks
critical
41358SuSE 11 Security Update : Mozilla Firefox (SAT Patch Number 1200)NessusSuSE Local Security Checks
critical
40934CentOS 3 : seamonkey (CESA-2009:1432)NessusCentOS Local Security Checks
critical
40933CentOS 4 : seamonkey (CESA-2009:1431)NessusCentOS Local Security Checks
critical
40932CentOS 4 / 5 : firefox / seamonkey (CESA-2009:1430)NessusCentOS Local Security Checks
critical
40923RHEL 3 : seamonkey (RHSA-2009:1432)NessusRed Hat Local Security Checks
critical
40922RHEL 4 : seamonkey (RHSA-2009:1431)NessusRed Hat Local Security Checks
critical
40921RHEL 4 / 5 : firefox (RHSA-2009:1430)NessusRed Hat Local Security Checks
critical
40648openSUSE Security Update : MozillaFirefox (MozillaFirefox-1202)NessusSuSE Local Security Checks
critical
40641openSUSE Security Update : MozillaFirefox (MozillaFirefox-1202)NessusSuSE Local Security Checks
critical
40523Mandriva Linux Security Advisory : firefox (MDVSA-2009:198)NessusMandriva Local Security Checks
high
40492Ubuntu 8.04 LTS / 8.10 / 9.04 : firefox-3.0, xulrunner-1.9 vulnerability (USN-811-1)NessusUbuntu Local Security Checks
medium
40484Fedora 10 : Miro-2.0.5-3.fc10 / blam-1.8.5-13.fc10 / epiphany-2.24.3-9.fc10 / etc (2009-8288)NessusFedora Local Security Checks
critical
40483Fedora 11 : kazehakase-0.5.6-11.svn3771_trunk.fc11.4 / Miro-2.0.5-3.fc11 / blam-1.8.5-13.fc11 / etc (2009-8279)NessusFedora Local Security Checks
critical
40479Firefox 3.5.x < 3.5.2 Multiple VulnerabilitiesNessusWindows
high
40478Firefox < 3.0.13 Multiple VulnerabilitiesNessusWindows
high
800771Firefox < 3.0.13/3.5.0 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
5113Mozilla Firefox < 3.0.13/3.5.0 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium