Web browser frame spoof

http-frame-spoof (1598) The risk level is classified as HighHigh Risk

Description:

A vulnerability in many popular Web browsers, including Netscape and Internet Explorer, allows a malicious Web site operator to trick a user into entering possibly compromising information. This vulnerability allows an attacker to create a frame inside a Web browser window that looks like that of a legitimate site, which could fool an unwary user to provide personal information on the Web site.


Consequences:

Obtain Information

Remedy:

Apply the patch for this vulnerability, as listed in Microsoft Security Bulletin MS98-020. See References.

As a workaround, if this is not possible, users should disable Javascript, which is required to exploit this vulnerability.

For Safari:
Apply the update for this vulnerability, as listed in Apple Security Update 2004-09-07. See References.

For Slackware Linux:
Upgrade to the latest mozilla package, as listed below. Refer to slackware-security Mailing List, Tue, 10 Aug 2004 14:17:12 -0700 (PDT) for more information. See References.

Slackware Linux 9.1: 1.4.3-i486-1 or later
Slackware Linux 10.0 and -current: 1.7.2-i486-1 or later

Upgrade to the latest kde package, as listed below. Refer to slackware-security Mailing List, Fri, 3 Sep 2004 22:01:35 -0700 (PDT) for more information. See References.

Slackware Linux 9.1: 3.1.4-i486-2 or later
Slackware Linux 10.0 and -current: 3.2.3-i486-2 or later

For KDE:
Apply the appropriate patch, as listed in KDE Security Advisory advisory-20040811-3. See References.

For Gentoo Linux:
Upgrade to the latest version of KDE (3.2.3-r1 or later), as listed in GLSA 200408-13. See References.

For Mandrake Linux:
Upgrade to the latest kdelibs package, as listed below.Refer to MandrakeSoft Security Advisory MDKSA-2004:086 : kdelibs/kdebase for more information.See References.

Mandrake Linux 9.2: 3.1.3-79.2.92mdk or later
Mandrake Linux 10.0: 3.2-79.2.100mdk or later

For Conectiva Linux:
Upgrade to the latest kde package, as listed below. Refer to Conectiva Linux Security Announcement CLSA-2004:864 for more information. See References.

Conectiva Linux 10.0: 3.2.3-63234U10_1cl or later
Conectiva Linux 9: 3.1.5-28535U90_5cl or later

For Conectiva Linux:
Upgrade to the latest mozilla package, as listed below. Refer to Conectiva Linux Security Announcement CLSA-2004:877 for more information. See References.

Conectiva Linux 10.0: 1.7.3-60868U10_1cl or later
Conectiva Linux 9: 1.7.3-27852U90_4cl or later

For SuSE Linux:
Apply the update for this vulnerability, as listed in SuSE Security Announcement SUSE-SA:2004:036. See References.

For Sun Solaris:
Apply the appropriate T-patch for your system, as listed below. Refer to Sun Alert ID: 57701 for more information. See References.

SPARC
Solaris 9: T117767-02 or later

x86 Platform
Solaris 9: T117768-02 or later

For Debian GNU/Linux 3.1 Sarge:
Upgrade to the latest versions of Mozilla Firefox (1.0.4-2sarge1 or later), as listed in DSA-775-1. See References.

For Debian GNU/Linux 3.1 Sarge:
Upgrade to the latest versions of Mozilla (1.7.8-1sarge1 or later), as listed in DSA-777-1. See References.

For Debian GNU/Linux 3.1 (Sarge):
Upgrade to the latest versions of Mozilla (1.7.8-1sarge2 or later), as listed in DSA-810-1. See References.

For Conectiva Linux 10.0:
Upgrade to the latest version of Mozilla (1.7.10 or later), as listed in Conectiva Linux Security Announcement CLSA-2005:994. See References.

For Red Hat Linux (Mozilla):
Refer to RHSA-2005:587-11 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux (Firefox):
Refer to RHSA-2005:586-11 for patch, upgrade, or suggested workaround information. See References.

For Ubuntu Linux:
Refer to USN-149-1, USN-149-2, USN-149-3 and USN-155-1 for patch, upgrade, or suggested workaround information. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

Platforms Affected:

  • Apple Safari
  • Canonical Ubuntu 4.10
  • Canonical Ubuntu 5.04
  • Conectiva Linux 10
  • Conectiva Linux 9.0
  • Debian Debian Linux 3.1
  • Gentoo Linux
  • KDE KDE 3.2.3
  • MandrakeSoft Mandrake Linux 10.0 AMD64
  • MandrakeSoft Mandrake Linux 10.0
  • MandrakeSoft Mandrake Linux 10.1
  • MandrakeSoft Mandrake Linux 10.1 X86_64
  • MandrakeSoft Mandrake Linux 9.2 AMD64
  • MandrakeSoft Mandrake Linux 9.2
  • MandrakeSoft Mandrake Linux LE2005 X86_64
  • MandrakeSoft Mandrake Linux LE2005
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • Microsoft Internet Explorer 2.0
  • Microsoft Internet Explorer 3.0.1
  • Microsoft Internet Explorer 3.0.2
  • Microsoft Internet Explorer 4.0
  • Microsoft Internet Explorer 4.0.1
  • Mozilla Firefox 1.0.3
  • Mozilla Mozilla Suite 1.7.7
  • Netscape Navigator
  • Novell Linux Desktop 9
  • Opera Opera Browser 7.50
  • Opera Opera Browser 7.51
  • RedHat Enterprise Linux 2.1 WS
  • RedHat Enterprise Linux 2.1 AS
  • RedHat Enterprise Linux 2.1 ES
  • RedHat Enterprise Linux 2.1 AW
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 3 Desktop
  • RedHat Enterprise Linux 3 WS
  • RedHat Enterprise Linux 4 AS
  • RedHat Enterprise Linux 4 Desktop
  • RedHat Enterprise Linux 4 WS
  • RedHat Enterprise Linux 4 ES
  • RedHat Linux Advanced Workstation 2.1 Itanium
  • Slackware Slackware Linux 10.0
  • Slackware Slackware Linux 9.1
  • Slackware Slackware Linux current
  • Sun Solaris 8
  • Sun Solaris 9
  • SuSE Linux Enterprise Server 8
  • SuSE Linux Enterprise Server 9
  • SUSE SuSE Linux 8.1
  • SUSE SuSE Linux 8.2
  • SUSE SuSE Linux 9.0
  • SUSE SuSE Linux 9.1
  • SUSE SuSE Linux 9.2
  • SUSE SuSE Linux 9.3
  • SuSE SuSE Linux Desktop 1.0
  • SuSE SuSE SLES 9

Reported:

Dec 23, 1998

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page