YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Firefox Vulnerability May Enable Password Theft

Posted On 07 Jan 2008
By : admin

MOUNTAIN VIEW, CA – A noted security researcher has issued a warning about a Firefox bug that could put passwords at risk.Aviv Raff, an Israeli who is best known for his work ferreting out browser security holes, said Wednesday that a log-on spoofing vulnerability could allow password thieves to trick users into revealing personal data. Although he posted the news to his blog along with a demonstration video, he did not disclose the code required for the spoof to work.

The flaw, which exists in Mozilla’s most recent Firefox release (version 2.0.0.11), involves the Realm header portion of a webpage, according to Raff. Because the flaw doesn’t sanitize single quotation marks and spaces in the Realm header, it is possible for a hacker to massage the code to make it look as if any authentication requests coming from the site come from somewhere else.

According to Raff, there are at least two potential scenarios that could exploit the flaw. In one, the spoof site could include a link to a trusted site like a bank or Web-based email service. When the user clicked on the link and entered his or her username and password in the resulting, genuine-looking dialog box, the data could be saved to the hacker’s server. In the other, a rigged image could be embedded in a blog, social-networking-site page or email message. Clicking the image could bring about the same result as in the previous example.

The video Raff included in his blog demonstrates how the flaw might be exploited using Google Checkout.

“Until Mozilla fixes this vulnerability, I recommend not to provide username and password to websites which show this dialog,” Raff wrote in his blog.

Mozilla last patched Firefox in late November. Late last week, Mozilla Chief of Security Window Snyder said the company is attempting to validate Raff’s claims.

  • google-share
Previous Story

FSC to Reveal New Board, Partnership, Campaign During Vegas Meeting

Next Story

Multi-AVN Award Nominated Evil Angel Introduces Evil Angel Cash

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • iWantClips
    Online Content Providers
  • United Credit Trust
    Online Billing Services
  • Zl Doll
    Clips Stores
  • Premiere Listing

    The European Summit

    More Details

RECENT

POPULAR

COMMENTS

Beth McKenna Stars in Perfect Little Pet with Leilani Lei & Whitney Morgan

Posted On 13 Sep 2025

Jessica Drake Brings Nationwide Pleasure Tour to Katy, TX on September 18

Posted On 12 Sep 2025

The Summer Never Ends with ‘The Glizzy Gangg Orgy’

Posted On 12 Sep 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Someone puts Gal Gadot in one of your vids? Take it down!

Posted On 13 Dec 2017

Hoping viewers can also enjoy a spooky...

Posted On 24 Oct 2023

now a days these type of games will get...

Posted On 17 Jul 2023

good move from adent. these type of...

Posted On 06 Jul 2023

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy