Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:1840 |
| Message | WEB-CLIENT Javascript document.domain attempt |
| Summary | This event is generated when a client on the protected network has possibly visited a website containing malicious javascript code. |
| Impact | Minimal |
| Detailed Information | Implementations of Javascript in multiple browsers on multiple platforms contain an error that may lead to a user inadvertantly running Javascript code of an attackers choosing. IP address lookup for a fully qualified domain name is not performed when choosing whether Javascript should be executed, if the hostname is served from a DNS server controlled by the attacker it may be possible for the attacker to run code of their choosing. |
| Affected Systems | Multiple browsers on multiple platforms. |
| Attack Scenarios | An attacker might try to fool a user into clicking a link in an email that points at an intranet server. The attacker is then able to run Javascript from a secondary host purporting to be the intranet server. |
| Ease of Attack | Simple |
| Corrective Action | Upgrade to the latest non-affected version of the software. |
| Additional References | |
| Rule References | bugtraq: 5346 cve: 2002-0815 |
--
DID:264694
--
http://www.aanval.com/