Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22014
HistoryJun 14, 2009 - 12:00 a.m.

Mozilla Foundation Security Advisory 2009-27

2009-06-1400:00:00
vulners.com
24

Mozilla Foundation Security Advisory 2009-27

Title: SSL tampering via non-200 responses to proxy CONNECT requests
Impact: High
Announced: June 11, 2009
Reporter: Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.0.11
Thunderbird 2.0.0.22
SeaMonkey 1.1.17
Description

Microsoft security researchers Shuo Chen, Ziqing Mao, Yi-Min Wang, and Ming Zhang reported that when a CONNECT request is sent to a proxy server and a non-200 response is returned, then the body of the response is incorrectly rendered within the context of the request Host: header. An active network attacker could use this vulnerability to intercept a CONNECT request and reply with a non-200 response containing malicious code which would be executed within the context of the victim's requested SSL-protected domain. Since this attack requires the victim to have a proxy configured, the severity of this issue was determined to be high.
References

* https://bugzilla.mozilla.org/show_bug.cgi?id=479880
* CVE-2009-1836