F
Fuzzy said:
I have Mozilla 1.7.7 and Firefox 1.0.4, both fail the test.???John Corliss said:Note the following:
"The vulnerability has been confirmed in the following browsers:
* Opera 7.51 for Windows
* Opera 7.50 for Linux
* Mozilla 1.6 for Windows
* Mozilla 1.6 for Linux
* Mozilla Firebird 0.7 for Linux
* Mozilla Firefox 0.8 for Windows
* Netscape 7.1 for Windows
* Internet Explorer for Mac 5.2.3
* Safari 1.2.2
* Konqueror 3.1-15redhat
Other versions may also be affected.
*The vulnerability also affects Internet Explorer*:
SA11966
Solution:
Do not browse untrusted sites while browsing trusted sites.
The following browsers are not affected:
* Mozilla Firefox 0.9 and later
* Mozilla 1.7
* Opera 7.52
* Netscape 7.2
* Camino 0.8 (build 2004062308)
KDE has issued patches for Konqueror."
gonzo said:I have Mozilla 1.7.7 and Firefox 1.0.4, both fail the test.???
Other versions may also be affected.
*The vulnerability also affects Internet Explorer*:
SA11966
The vulnerability has been confirmed in Firefox 1.0.4 and Mozilla 1.7.8.
Other versions may also be affected.
Not according to the above:
__________________________________
The following browsers are not affected:
* Mozilla Firefox 0.9 and later
* Mozilla 1.7
__________________________________
I intend to keep using Mozilla to surf and I'm still using 1.7.5.
ad 1. Wrong. JS need not be enabled.elaich said:The bug only works if you:
1. Have Javascript enabled, and:
2. Open new windows when clicking on links rather than use
tabbed browsing.
Seeing how some sites force new windows to open, it's a
concern, but not a large one.
Fuzzy said:
I failed with Firefox (Mozilla/5.0 (Windows; U; Windows NT 5.1;
en-US; rv:1.7.8).
Other than capturing info (not a small theft) what else could the
*fake* window do? My firewall still protects me unless I manually
provide (key in) information at a site - -Correct?
»Q« said:That version has the vulnerability. To make the Secunia demo work, you
have to have the browser set to open new windows instead of tabs.
It's just a spoofing vulnerability -- as long as you are not fooled
into entering info into a form in a spoofed page, no worries. If you
are ever unsure about whether a frame is legit, right click it and
choose "this frame » view frame info" to see what its URL is.
elaich said:The bug only works if you:
1. Have Javascript enabled, and:
2. Open new windows when clicking on links rather than use tabbed
browsing.
Seeing how some sites force new windows to open, it's a concern, but
not a large one.
Aaron said:Firefox can be set to ignore what the website wants.
John said:Not according to the above
elaich said:The bug only works if you:
1. Have Javascript enabled, and:
2. Open new windows when clicking on links rather than use tabbed
browsing.
Seeing how some sites force new windows to open, it's a concern, but
not a large one.
OK?
How?
It begs the question:
How do we know *what* any website *wants*
(and how does one selectively
not provide it)?