DNS rebinding, does comodo firewall protect against it?

is comodo firewall able to avoid this to happen? as far as i understand it, the browser would become a door to the data on my pc, and an attacker could use that door. possible by just visiting the “wrong page”.

"Millions" Of Home Routers Vulnerable To Web Hack as an example of that exploit

the firefox add-on “noscript” in version 2 is protecting against this exploit

good news.
but still wondering, if comodo does protect us too…

First guess is no it doesn’t.

But what I have done ages ago is block outgoing traffic to my routers web interface(s) on global rules.
This prevents the browser to connect to your Wifi AP and routers to get “hacked” in this case you also need to keep your default password on the routers, witch is also not very advisable.

i dont understand why i should keep the default password with your idea. erasing of the global rule would let me connect again to my router, whatever password i have.

about noscript version 2, it defines your ip (the real ip, even if your pc is behind a router) as local. that should be possible for a firewall also. i am thinking about all the people who dont use firefox or this very usefull add on…

Sorry for the confusion, in order to login to your router the script will try “default” passwords, so if you change you router password, this script should not be able to login to your router at all.
Unless your running vulnerable firmware that is.

about noscript version 2, it defines your ip (the real ip, even if your pc is behind a router) as local. that should be possible for a firewall also. i am thinking about all the people who dont use firefox or this very usefull add on....
Yes it uses ABE for that, problem is the Firewall can't block all traffic to those IP's because that will break your connection, it should only block the access to the management ports.

It would be a nice feature but I doubt if they will put it in…

as comodo has predefined rules for web-browsers, it is only needed to define a web-browser rule that does the trick. as you said, the router password should be a barriere. but the router accessing is only one example of exploiting this. more dangerous in usual using of the internet is the “fooling of the web-browser” to browse in your computer, while “thinking” its the internet, and then it would show an attacker the result of the browsing, as if it were you!
i dont know enough about zone management, so i cant tell a rule. but i am sure, someone who knows about that would be able to find a way.
if comodo would be the second exclusive program that protects against this… :slight_smile: