Closed
Bug 190532
Opened 22 years ago
Closed 22 years ago
IRC may need port restriction to avoid SMTP exploit
Categories
(Other Applications Graveyard :: ChatZilla, defect)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: security-bugs, Assigned: rginda)
Details
Attachments
(1 file)
|
3.69 KB,
patch
|
darin.moz
:
review+
dbaron
:
approval1.3b+
|
Details | Diff | Splinter Review |
From Georgi:
We may want to restrict the ports that IRC can use, since it might be
possible to use a link like
<a href="irc://localhost:25">IRC TO localhost:smtp</a>
to send mail in another user's name, similar to a problem we once had with Gopher.
| Assignee | ||
Comment 1•22 years ago
|
||
I don't see how it would be possible to send anything that looks like SMTP over
irc:, but I could be wrong.
http://lxr.mozilla.org/mozilla/source/extensions/irc/js/lib/chatzilla-service.js#171
It looks to me that chatzilla shouldn't allow connections over questionable
ports, but I've never actually seen this function get called. Mitch, what's the
deal with nsIProtocolHandler.allowPort? Is it only supposed to be called for
questionable ports, or all ports? Any idea why it isn't being called for me?
Status: NEW → ASSIGNED
Comment 2•22 years ago
|
||
rob: you need to call nsIIOService::allowPort from your implementation of
newChannel if you want to use the standard port blocking mechanism.
nsIOService::AllowPort will invoke your nsIProtocolHandler::allowPort to give
you the opportunity to override a port that the io service would otherwise
block. see nsIIOService.idl and nsIProtocolHandler.idl for more details. this
stuff is sort of documented there.
Comment 3•22 years ago
|
||
btw: this issue is not just with SMTP... we generally block other ports as well.
the list is in nsIOService.cpp.
| Assignee | ||
Comment 4•22 years ago
|
||
Patch uses allowPort as described by darin. I also took the opportunity to
remove some of the aUseless aArgument aPrefixes that I hate so much in
JavaScript.
| Assignee | ||
Updated•22 years ago
|
Attachment #113511 -
Flags: review?(darin)
Attachment #113511 -
Flags: approval1.3b?
Comment 5•22 years ago
|
||
Comment on attachment 113511 [details] [diff] [review]
patch
r/sr=darin (looks good!)
i really wish we had chosen different names for nsIIOService::allowPort and
nsIProtocolHandler::allowPort, since the sense of the return value is
inconsistent :-(
the protocol handler one should have been called something like
"overridePortBan" or something more to the point.
Attachment #113511 -
Flags: review?(darin) → review+
Attachment #113511 -
Flags: approval1.3b? → approval1.3b+
| Assignee | ||
Comment 6•22 years ago
|
||
checked in.
Status: ASSIGNED → RESOLVED
Closed: 22 years ago
Resolution: --- → FIXED
Comment 7•21 years ago
|
||
Bugs published on the Known-vulnerabilities page long ago, removing confidential
flag.
Group: security
Updated•20 years ago
|
Product: Core → Other Applications
Updated•6 months ago
|
Product: Other Applications → Other Applications Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•