Closed
Bug 304143
Opened 19 years ago
Closed 19 years ago
Hooking WinSock functions under Windows platform, can give you Pishing Scam ability
Categories
(Firefox :: Security, defect)
Tracking
()
VERIFIED
INVALID
People
(Reporter: brunildo, Unassigned)
Details
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; pt-BR; rv:1.7.10) Gecko/20050717 Firefox/1.0.6 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; pt-BR; rv:1.7.10) Gecko/20050717 Firefox/1.0.6 If you hook WinSock APIs, you can easily do a Web-site Redirector. Ok, what does this has to do with FireFox? Simple. The other page will be reproduced on FireFox screen but the Address Bar will show de old address. For example: If we change the packets wich are like "GET www.uol.com.br", and change it to "GET www.mozilla.com", Mozzila web-site will appear on my screen, but the Address bar will keep written "www.uol.com.br". Reproducible: Always Steps to Reproduce: Can't reproduce easly like this. This technique is used by viruses-softwares. Actual Results: Already told in "Details" field
Comment 1•19 years ago
|
||
So you mean if you have spyware or a virus on your system already, it can control networking requests and fake DNS? That's far beyond our control....
| Reporter | ||
Comment 2•19 years ago
|
||
If you wish I can send you an executable wich can explore the this miss-security (sorry for bad english). That's not far beyond your control... could not be that hard to put 6 bytes at the beginning of the "send" API before calling "send". This can prevent API Hooking and everything else. Other possibilitie is to rewrite into the Address Field, when you get an answer from the server, with the web-site location.
Comment 3•19 years ago
|
||
Even if it's possible to instruct Windows to skip hooks on certain APIs, I don't think it's possible for Firefox to protect itself from spyware running on the same Windows account.
Group: security
Status: UNCONFIRMED → RESOLVED
Closed: 19 years ago
Resolution: --- → INVALID
Comment 4•19 years ago
|
||
Note that the same spoofing can be done external to the user's box (e.g. Google "airpwn"). SSL prevents these MITM attacks, without SSL you can never be sure. Asking the resulting host is no good. Might catch a prank redirection, but in a real attack the site will presumably say "Oh yes, I *am* your bank" in any non-secure ways we think to check.
| Reporter | ||
Comment 5•19 years ago
|
||
Oh.. Yes Daniel, you are right.. Every solution has a negative point. Anyway, hooking is not for everyone. Thanks for the really really fast bugtrack answer!
Status: RESOLVED → VERIFIED
You need to log in
before you can comment on or make changes to this bug.
Description
•