Re: Security considerations for DNS rebinding

On Tue, Feb 9, 2010 at 9:14 PM, Adam Barth <w3c@adambarth.com> wrote:
>> I see some specific IE vulnerabilities cited here which allow the Host header to be forged via request splitting over a proxy: <http://www.securityfocus.com/archive/1/411585> It also cites some old Mozilla bugs that enabled header injection. And also some Flash vulnerabilities
>>
>> Do these vulnerabilities or any similar ones still exist in current versions of browsers or in Flash?
>
> Not that I'm aware of.  Put another way, all the user agents that have
> those vulnerabilities also have known arbitrary code execution
> vulnerabilities, so it's not really worth worrying about.

I don't want to split hairs here, but the fact that browsers had
remote command execution bugs (which were probably fixed) doesn't mean
that the less critical issue of Host header forging was addressed.

Anyway, was http://www.securityfocus.com/archive/1/466906 ever addressed in IE?

Received on Wednesday, 10 February 2010 07:56:43 UTC