ID CVE-2005-0237
Summary The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
References
Vulnerable Configurations
  • cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-10-2018 - 15:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
oval via4
accepted 2013-04-29T04:07:36.938-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
family unix
id oval:org.mitre.oval:def:10671
status accepted
submitted 2010-07-09T03:56:16-04:00
title The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
version 29
redhat via4
advisories
rhsa
id RHSA-2005:325
rpms
  • kdelibs-6:3.3.1-3.6
  • kdelibs-debuginfo-6:3.3.1-3.6
  • kdelibs-devel-6:3.3.1-3.6
refmap via4
bid 12461
confirm http://www.kde.org/info/security/advisory-20050316-2.txt
fedora FLSA:178606
fulldisc
  • 20050206 Re: state of homograph attacks
  • 20050206 state of homograph attacks
mandrake MDKSA-2005:058
misc
secunia 14162
xf multiple-browsers-idn-spoof(19236)
Last major update 19-10-2018 - 15:31
Published 02-05-2005 - 04:00
Last modified 19-10-2018 - 15:31
Back to Top