FreeBSD : Mutiple browser frame injection vulnerability (641859e8-eca1-11d8-b913-000c41e2cdad)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A class of bugs affecting many web browsers in the same way was
discovered. A Secunia advisory reports :

The problem is that the browsers don't check if a target frame belongs
to a website containing a malicious link, which therefore doesn't
prevent one browser window from loading content in a named frame in
another window.

Successful exploitation allows a malicious website to load arbitrary
content in an arbitrary frame in another browser window owned by e.g.
a trusted site.

A KDE Security Advisory reports :

A malicious website could abuse Konqueror to insert its own frames
into the page of an otherwise trusted website. As a result the user
may unknowingly send confidential information intended for the trusted
website to the malicious website.

Secunia has provided a demonstration of the vulnerability at
http://secunia.com/multiple_browsers_frame_injection_vulnerability_tes
t/.

See also :

http://bugzilla.mozilla.org/show_bug.cgi?id=246448
http://www.nessus.org/u?a27f9fd0
http://www.nessus.org/u?9b160511
http://www.nessus.org/u?a8957586

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 56476 ()

Bugtraq ID:

CVE ID: CVE-2004-0717
CVE-2004-0718
CVE-2004-0721

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now