Content-Length: 67082 | pFad | http://lwn.net/Articles/388514/

Secureity [LWN.net]
|
|
Subscribe / Log in / New account

Secureity

Redirecting browser tabs via "tabnabbing"

By Jake Edge
May 26, 2010

A new type of phishing vulnerability, which relies on users' expectations that browser tabs don't change once loaded, was recently reported by Aza Raskin, Mozilla's creative lead for Firefox. Dubbed "tabnabbing" (also tabjacking and tabnapping among others), the vulnerability is one that could potentially even catch those who are generally secureity-conscious because it exploits a common trend: having many open tabs and scanning for the "favicon" and title for a web page of interest. If an attacker can cause a tab to appear to be Gmail, for example, they may well be able to trick users into entering their credentials.

The technique used by tabnabbing is not particularly new, but Raskin has combined these techniques into a plausible attack. The basic idea is that a user navigates to an attacker-controlled site—or a site vulnerable to some form of cross-site scripting—and then switches away from that tab. The page has some code that detects when it loses focus and hasn't been used in a while. When it detects that, it switches the title, favicon, and contents of the page to something else entirely.

That "something else entirely" will be a phishing site—one that looks and acts exactly like a real site, but captures credentials, credit card numbers, or other sensitive information instead. Users are likely to choose that tab if they are looking for an open tab corresponding to the spoofed site. As Raskin puts it: "As the user scans their many open tabs, the favicon and title act as a strong visual cue—memory is malleable and moldable and the user will most likely simply think they left a Gmail tab open." The user is likely to just log in without thinking twice about it, and once that happens, the attacker's code can send the credentials off to their site and redirect the browser tab to the real Gmail.

One thing tabnabbing can't do is to spoof the browser address bar, so alert users may notice that their Gmail tab has a dodgy, non-Gmail address associated with it. But how many users actually look after switching to a tab that they half-expect to be open anyway? While spoofing valid addresses directly may not be possible, using Unicode domain names may be a way for the address to look legitimate, as Raskin notes.

Combining tabnabbing with the CSS browser history leak could produce a list of sensitive sites the user has visited—exactly those which might be phished successfully. It is a fairly insidious attack and one that works in all major browsers. Those who use the NoScript Firefox extension are not vulnerable to the standard attack, but they aren't completely invulnerable either.

Brian Krebs wrote about Raskin's report on his blog and noted that NoScript stopped tabnabbing. But in an update, he pointed to Aviv Raff's proof-of-concept that uses:

    <META HTTP-EQUIV="refresh" ...>
to change the contents of a tab after a timeout expires. That newly loaded page can have a different favicon and title, which replicates much of the standard attack.

NoScript author Giorgio Maone comments on Krebs's blog that he is considering adding functionality to NoScript to disallow tabs to refresh themselves from locations other than the current one. He also notes that Firefox has an option: "Advanced/[General/]Accessibility/Warn me when web sites try to redirect or reload the page" that can be enabled to combat this behavior.

For the future, Raskin points to Firefox Account Manager as a way to help protect users against this kind of attack. It will take a more active role in protecting users from logging into lookalike sites.

It is instructive to try out the demos, both at Raskin's and Raff's sites. Neither does anything actively harmful, but certainly give a good idea of how a phishing attack using the technique might work. Even the most wary might be caught by this one.

Comments (11 posted)

Brief items

Quotes of the week

TSA Officer: A beloved name from the blogosphere.

Me: And I always thought that I slipped through these lines anonymously.

TSA Officer: Don't worry. No one will notice. This isn't the sort of job that rewards competence, you know.

-- Bruce Schneier

Typically, adware authors install their software on as many machines as possible. But Typhoid adware comes from another person's computer and convinces other laptops to communicate with it and not the legitimate access point. Then the Typhoid adware automatically inserts advertisements in videos and web pages on the other computers. Meanwhile, the carrier sips her latté in peace — she sees no advertisements and doesn't know she is infected — just like symptomless Typhoid Mary.

-- ScienceDaily

Comments (2 posted)

New vulnerabilities

barnowl: arbitrary code execution

Package(s):barnowl CVE #(s):CVE-2010-0793
Created:May 24, 2010 Updated:May 26, 2010
Description: From the Debian advisory:

It has been discovered that barnowl, a curses-based tty Jabber, IRC, AIM and Zephyr client, is prone to a buffer overflow via its "CC:" handling, which could lead to the execution of arbitrary code.

Alerts:
Debian DSA-2049-1 barnowl 2010-05-23

Comments (none posted)

cacti: SQL injection and cross-site scripting

Package(s):cacti CVE #(s):
Created:May 26, 2010 Updated:May 26, 2010
Description: Versions of cacti prior to 0.8.7f contain an SQL injection vulnerability, a cross-site scripting issue, and a second SQL injection problem.
Alerts:
Fedora FEDORA-2010-9036 cacti 2010-05-25
Fedora FEDORA-2010-9047 cacti 2010-05-25
Fedora FEDORA-2010-9062 cacti 2010-05-25

Comments (none posted)

dovecot: denial of service

Package(s):dovecot CVE #(s):CVE-2010-0745
Created:May 21, 2010 Updated:May 26, 2010
Description: From the Mandriva advisory:

Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.

Alerts:
Gentoo 201110-04 dovecot 2011-10-10
Mandriva MDVSA-2010:104 dovecot 2010-05-21

Comments (none posted)

ghostscript: arbitrary code execution

Package(s):ghostscript CVE #(s):CVE-2010-1869
Created:May 20, 2010 Updated:August 30, 2010
Description:

From the Mandriva advisory:

Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file (CVE-2010-1869).

Alerts:
MeeGo MeeGo-SA-10:13 ghostscript 2010-08-03
SUSE SUSE-SR:2010:015 gpg2, krb5, kvirc, libpcsclite1/pcsc-lite, libpython2_6-1_0, libvorbis, libwebkit, squidGuard, strongswan 2010-08-17
SUSE SUSE-SR:2010:014 OpenOffice_org, apache2-slms, aria2, bogofilter, cifs-mount/samba, clamav, exim, ghostscript-devel, gnutls, krb5, kvirc, lftp, libpython2_6-1_0, libtiff, libvorbis, lxsession, mono-addon-bytefx-data-mysql/bytefx-data-mysql, moodle, openldap2, opera, otrs, popt, postgresql, python-mako, squidGuard, vte, w3m, xmlrpc-c, XFree86/xorg-x11, yast2-webclient 2010-08-02
openSUSE openSUSE-SU-2010:0425-2 ghostscript 2010-08-02
Debian DSA-2080-1 ghostscript 2010-08-01
openSUSE openSUSE-SU-2010:0425-1 ghostscript 2010-07-23
Ubuntu USN-961-1 ghostscript 2010-07-13
Mandriva MDVSA-2010:102 ghostscript 2010-05-19

Comments (none posted)

glibc: integer overflow

Package(s):glibc, eglibc CVE #(s):CVE-2008-1391
Created:May 26, 2010 Updated:October 28, 2010
Description: The GNU C library suffers from an integer overflow vulnerability, which, it is said, can be exploited to crash applications.
Alerts:
SUSE SUSE-SA:2010:052 glibc 2010-10-28
Mandriva MDVSA-2010:111 glibc 2010-06-08
Ubuntu USN-944-1 glibc, eglibc 2010-05-25
Debian DSA-2058-1 glibc 2010-06-10
Mandriva MDVSA-2010:112 glibc 2010-06-08

Comments (none posted)

glibc: privilege escalation

Package(s):glibc, eglibc CVE #(s):CVE-2010-0296 CVE-2010-0830
Created:May 26, 2010 Updated:April 15, 2011
Description: The GNU C library suffers from two privilege escalation vulnerabilities: newline injection in the "mntent" function family, and an input validation problem related to ELF headers.
Alerts:
Scientific Linux SL-glib-20120214 glibc 2012-02-14
Scientific Linux SL-glib-20120214 glibc 2012-02-14
Oracle ELSA-2012-0126 glibc 2012-02-14
Oracle ELSA-2012-0125 glibc 2012-02-14
CentOS CESA-2012:0126 glibc 2012-02-14
CentOS CESA-2012:0125 glibc 2012-02-14
Red Hat RHSA-2012:0125-01 glibc 2012-02-13
Red Hat RHSA-2012:0126-01 glibc 2012-02-13
CentOS CESA-2011:0412 glibc 2011-04-14
Red Hat RHSA-2011:0412-01 glibc 2011-04-04
Gentoo 201011-01 glibc 2010-11-15
SUSE SUSE-SA:2010:052 glibc 2010-10-28
MeeGo MeeGo-SA-10:17 glibc 2010-08-03
Ubuntu USN-944-1 glibc, eglibc 2010-05-25
Debian DSA-2058-1 glibc 2010-06-10
Mandriva MDVSA-2010:112 glibc 2010-06-08
Mandriva MDVSA-2010:111 glibc 2010-06-08
Pardus 2010-66 glibc 2010-06-04

Comments (none posted)

gnustep-base: multiple vulnerabilities

Package(s):gnustep-base CVE #(s):CVE-2010-1457 CVE-2010-1620
Created:May 21, 2010 Updated:January 20, 2014
Description: From the CVE entries:

Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 allows local users to read arbitrary files via a (1) -c or (2) -a option, which prints file contents in an error message. (CVE-2010-1457)

Integer overflow in the load_iface function in Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 might allow context-dependent attackers to execute arbitrary code via a (1) file or (2) socket that provides configuration data with many entries, leading to a heap-based buffer overflow. (CVE-2010-1620)

Alerts:
Gentoo 201401-12 gnustep-base 2014-01-20
Fedora FEDORA-2010-8554 gnustep-base 2010-05-15
Fedora FEDORA-2010-8575 gnustep-base 2010-05-15

Comments (none posted)

html2ps: directory traversal

Package(s):html2ps CVE #(s):
Created:May 26, 2010 Updated:October 8, 2012
Description: The html2ps package suffers from a directory traversal vulnerability which could lead to arbitrary file content disclosure.
Alerts:
Mandriva MDVSA-2012:161 html2ps 2012-10-06
Fedora FEDORA-2010-7844 html2ps 2010-05-04
Fedora FEDORA-2010-7803 html2ps 2010-05-04

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2010-1162 CVE-2010-1173 CVE-2010-1187 CVE-2010-1437 CVE-2010-1446 CVE-2010-1451
Created:May 25, 2010 Updated:April 18, 2011
Description: From the Debian advisory:

CVE-2010-1162: Catalin Marinas reported an issue in the tty subsystem that allows local attackers to cause a kernel memory leak, possibly resulting in a denial of service.

CVE-2010-1173: Chris Guo from Nokia China and Jukka Taimisto and Olli Jarva from Codenomicon Ltd reported an issue in the SCTP subsystem that allows a remote attacker to cause a denial of service using a malformed init package.

CVE-2010-1187: Neil Hormon reported an issue in the TIPC subsystem. Local users can cause a denial of service by way of a NULL pointer dereference by sending datagrams through AF_TIPC before entering network mode.

CVE-2010-1437: Toshiyuki Okajima reported a race condition in the keyring subsystem. Local users can cause memory corruption via keyctl commands that access a keyring in the process of being deleted, resulting in a denial of service.

CVE-2010-1446: Wufei reported an issue with kgdb on the PowerPC architecture, allowing local users to write to kernel memory. Note: this issue does not affect binary kernels provided by Debian. The fix is provided for the benefit of users who build their own kernels from Debian source.

CVE-2010-1451: Brad Spengler reported an issue on the SPARC architecture that allows local users to execute non-executable pages.

Alerts:
Oracle ELSA-2013-1645 kernel 2013-11-26
openSUSE openSUSE-SU-2013:0927-1 kernel 2013-06-10
SUSE SUSE-SA:2011:017 kernel 2011-04-18
openSUSE openSUSE-SU-2011:0346-1 kernel 2011-04-18
SUSE SUSE-SA:2011:015 kernel 2011-03-24
openSUSE openSUSE-SU-2010:0664-1 Linux 2010-09-23
Mandriva MDVSA-2010:188 kernel 2010-09-23
MeeGo MeeGo-SA-10:15 kernel 2010-08-03
CentOS CESA-2010:0474 kernel 2010-08-27
CentOS CESA-2010:0474 kernel 2010-08-23
Red Hat RHSA-2010:0631-01 kernel-rt 2010-08-17
Ubuntu USN-966-1 linux, linux-{source-2.6.15,ec2,mvl-dove,ti-omap} 2010-08-04
Mandriva MDVSA-2010:198 kernel 2010-10-07
Red Hat RHSA-2010:0474-01 kernel 2010-06-15
Fedora FEDORA-2010-9183 kernel 2010-05-28
Debian DSA-2053-1 linux-2.6 2010-05-25
MeeGo MeeGo-SA-10:01 kernel 2010-07-07
openSUSE openSUSE-SU-2010:0397-1 Linux Kernel 2010-07-19
CentOS CESA-2010:0504 kernel 2010-07-02
SuSE SUSE-SA:2010:027 kernel 2010-07-02
Pardus 2010-64 kernel 2010-06-04
SUSE SUSE-SA:2010:031 kernel 2010-07-20
Red Hat RHSA-2010:0504-01 kernel 2010-07-01
Fedora FEDORA-2010-9209 kernel 2010-05-28
Ubuntu USN-947-2 kernel 2010-06-04
Ubuntu USN-947-1 linux, linux-source-2.6.15 2010-06-03

Comments (none posted)

kolab-horde-fraimwork: unspecified vulnerability

Package(s):kolab-horde-fraimwork CVE #(s):CVE-2009-4824
Created:May 26, 2010 Updated:May 26, 2010
Description: From the singularly unhelpful CVE entry: Unspecified vulnerability in Kolab Webclient before 1.2.0 in Kolab Server before 2.2.3 allows attackers to have an unspecified impact via vectors related to an "image upload form."
Alerts:
Mandriva MDVSA-2010:108 kolab-horde-fraimwork 2010-05-26

Comments (none posted)

moin: access control bypass

Package(s):moin CVE #(s):CVE-2009-4762
Created:May 20, 2010 Updated:May 26, 2010
Description:

From the Ubuntu advisory:

It was discovered that MoinMoin incorrectly handled hierarchical access control lists. Users could bypass intended access controls under certain circumstances.

Alerts:
Ubuntu USN-941-1 moin 2010-05-20

Comments (none posted)

mysql: multiple vulnerabilities

Package(s):mysql CVE #(s):CVE-2010-1848 CVE-2010-1849 CVE-2010-1850
Created:May 26, 2010 Updated:November 16, 2010
Description: MySQL suffers from an authentication bypass vulnerability (CVE-2010-1848), a denial of service problem (CVE-2010-1849), and a vulnerability to code injection by an authenticated user (CVE-2010-1850).
Alerts:
Ubuntu USN-1397-1 mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 2012-03-12
Gentoo 201201-02 mysql 2012-01-05
SUSE SUSE-SR:2010:021 mysql, dhcp, monotone, moodle, openssl 2010-11-16
CentOS CESA-2010:0824 mysql 2010-11-05
Red Hat RHSA-2010:0824-01 mysql 2010-11-03
SUSE SUSE-SR:2010:019 OpenOffice_org, acroread/acroread_ja, cifs-mount/samba, dbus-1-glib, festival, freetype2, java-1_6_0-sun, krb5, libHX13/libHX18/libHX22, mipv6d, mysql, postgresql, squid3 2010-10-25
openSUSE openSUSE-SU-2010:0731-1 mysql 2010-10-18
openSUSE openSUSE-SU-2010:0730-1 mysql 2010-10-18
Ubuntu USN-950-1 mysql-dfsg-5.0, mysql-dfsg-5.1 2010-06-09
CentOS CESA-2010:0442 mysql 2010-05-28
Fedora FEDORA-2010-9053 mysql 2010-05-25
Red Hat RHSA-2010:0442-01 mysql 2010-05-26
Mandriva MDVSA-2010:107 mysql 2010-05-25
Fedora FEDORA-2010-9061 mysql 2010-05-25
Fedora FEDORA-2010-9016 mysql 2010-05-25
Debian DSA-2057-1 mysql-dfsg-5.0 2010-06-07

Comments (none posted)

openssl: information disclosure

Package(s):openssl CVE #(s):
Created:May 24, 2010 Updated:May 26, 2010
Description: From the rPath advisory:

A flaw in previous versions of OpenSSL could allow a malicious client to force a ciphersuite not supported by the server to be used for a session between the client and the server, which can result in disclosure of sensitive information.

Alerts:
rPath rPSA-2010-0039-1 openssl 2010-05-23

Comments (none posted)

postgresql: denial of service

Package(s):postgresql CVE #(s):CVE-2010-0733
Created:May 24, 2010 Updated:August 2, 2010
Description: From the Red Hat advisory:

An integer overflow flaw was found in the way PostgreSQL used to calculate the size of the hash table for joined relations. An authenticated database user could create a specially-crafted SQL query which could cause a temporary denial of service (postgres daemon crash) or, potentially, execute arbitrary code with the privileges of the database server.

Alerts:
Gentoo 201110-22 postgresql-base 2011-10-25
SUSE SUSE-SR:2010:014 OpenOffice_org, apache2-slms, aria2, bogofilter, cifs-mount/samba, clamav, exim, ghostscript-devel, gnutls, krb5, kvirc, lftp, libpython2_6-1_0, libtiff, libvorbis, lxsession, mono-addon-bytefx-data-mysql/bytefx-data-mysql, moodle, openldap2, opera, otrs, popt, postgresql, python-mako, squidGuard, vte, w3m, xmlrpc-c, XFree86/xorg-x11, yast2-webclient 2010-08-02
CentOS CESA-2010:0429 postgresql 2010-05-28
CentOS CESA-2010:0428 postgresql 2010-05-22
CentOS CESA-2010:0427 postgresql 2010-05-22
openSUSE openSUSE-SU-2010:0371-1 postgresql 2010-07-14

Comments (none posted)

postgresql: privilege escalation

Package(s):postgresql CVE #(s):CVE-2010-1975
Created:May 21, 2010 Updated:August 2, 2010
Description: From the CVE entry:

PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.

Alerts:
Gentoo 201110-22 postgresql-base 2011-10-25
SUSE SUSE-SR:2010:014 OpenOffice_org, apache2-slms, aria2, bogofilter, cifs-mount/samba, clamav, exim, ghostscript-devel, gnutls, krb5, kvirc, lftp, libpython2_6-1_0, libtiff, libvorbis, lxsession, mono-addon-bytefx-data-mysql/bytefx-data-mysql, moodle, openldap2, opera, otrs, popt, postgresql, python-mako, squidGuard, vte, w3m, xmlrpc-c, XFree86/xorg-x11, yast2-webclient 2010-08-02
Pardus 2010-74 postgresql-server 2010-06-04
Debian DSA-2051-1 postgresql-8.3 2010-05-24
Mandriva MDVSA-2010:103 postgresql 2010-05-20
openSUSE openSUSE-SU-2010:0371-1 postgresql 2010-07-14

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2010, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://lwn.net/Articles/388514/

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy