Closed Bug 1225678 Opened 10 years ago Closed 9 years ago

startup crash in nsGlobalWindow::SetDocShell

Categories

(Core :: DOM: Core & HTML, defect)

44 Branch
x86
Windows
defect
Not set
critical

Tracking

()

RESOLVED WORKSFORME
Tracking Status
firefox44 + fixed

People

(Reporter: u279076, Unassigned)

Details

(Keywords: crash, topcrash-win, Whiteboard: [malware?])

Crash Data

Attachments

(1 file)

This bug was filed from the Socorro interface and is report bp-630afc12-4496-4b50-93d0-674f22151116. ============================================================= 0 xul.dll nsGlobalWindow::SetDocShell(nsIDocShell*) dom/base/nsGlobalWindow.cpp Ø 1 {9a887e1c-4078-4827-9a31-aafc133f05ec}.xpi {9a887e1c-4078-4827-9a31-aafc133f05ec}.xpi@0x2a93 2 xul.dll nsObserverList::NotifyObservers(nsISupports*, char const*, wchar_t const*) xpcom/ds/nsObserverList.cpp 3 xul.dll nsObserverService::NotifyObservers(nsISupports*, char const*, wchar_t const*) xpcom/ds/nsObserverService.cpp 4 xul.dll nsContentSink::NotifyDocElementCreated(nsIDocument*) dom/base/nsContentSink.cpp 5 xul.dll nsDocElementCreatedNotificationRunner::Run() dom/base/nsDocElementCreatedNotificationRunner.h 6 xul.dll nsHTMLDocument::EndUpdate(unsigned int) dom/html/nsHTMLDocument.cpp 7 xul.dll nsHtml5DocumentBuilder::EndDocUpdate() parser/html/nsHtml5DocumentBuilder.h 8 xul.dll nsHtml5TreeOpExecutor::StartLayout() parser/html/nsHtml5TreeOpExecutor.cpp 9 xul.dll nsHtml5TreeOperation::Perform(nsHtml5TreeOpExecutor*, nsIContent**) parser/html/nsHtml5TreeOperation.cpp 10 xul.dll nsHtml5TreeOpExecutor::RunFlushLoop() parser/html/nsHtml5TreeOpExecutor.cpp 11 xul.dll nsHtml5ExecutorFlusher::Run() parser/html/nsHtml5StreamParser.cpp 12 xul.dll nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp 13 xul.dll mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp 14 xul.dll MessageLoop::RunHandler() ipc/chromium/src/base/message_loop.cc 15 xul.dll nsThreadManager::NewThread(unsigned int, unsigned int, nsIThread**) xpcom/threads/nsThreadManager.cpp 16 xul.dll nsAppShell::Run() widget/windows/nsAppShell.cpp 17 xul.dll XREMain::XRE_mainRun() toolkit/xre/nsAppRunner.cpp 18 xul.dll XREMain::XRE_main(int, char** const, nsXREAppData const*) toolkit/xre/nsAppRunner.cpp 19 xul.dll XRE_main toolkit/xre/nsAppRunner.cpp 20 windows.storage.dll FileExplorerTelemetry::DefView_Group::StopActivity() ============================================================= https://crash-stats.mozilla.com/report/list?product=Firefox&signature=nsGlobalWindow%3A%3ASetDocShell This is a startup crash that appears to be spiking with Firefox Aurora 44.0a2. 10% of the reports correlate to the firefox@zenmate.com addon but most the reports have an xpi with different UUIDs in the second frame of the crashing thread. Hiding the bug for now since all reports show high exploitibility.
[Tracking Requested - why for this release]: nominating to track since this is the #4 topcrash in Aurora.
baku, khuey: any thoughts here? (I'm starting with you mostly randomly based on blame)
Flags: needinfo?(khuey)
Flags: needinfo?(amarchesini)
It seems that that window is not valid anymore. Could it be that a previous observer deleted the document?
Flags: needinfo?(amarchesini)
Why does the stack have a .xpi in it?
Flags: needinfo?(khuey) → needinfo?(ted)
(In reply to Kyle Huey [:khuey] (khuey@mozilla.com) from comment #5) > Why does the stack have a .xpi in it? Looking around it seems that often we see the XPI UUID of the default FF theme.
Group: core-security → dom-core-security
This is certainly puzzling! The full path to that file is C:\Users\wawa\AppData\Local\Temp\{9A887E1C-4078-4827-9A31-AAFC133F05EC}.xpi . I noticed it has a version number specified, so it can't be an actual XPI file (or it wouldn't have valid version information). Googling that version number (1.0.5798.16892) only pulled up 5 results, all of which are malware listings: https://www.reasoncoresecurity.com/plugin.exe-2d6ae36b7b42f66c359d4273c505ddc0e182821d.aspx Dollars to donuts this is some variant of that malware.
Flags: needinfo?(ted)
Andrew, is there any chance we might get a dev to investigate this some more? On 44.0b, this is data for last 28 days: Product Version Percentage Number Of Crashes Firefox 44.0a2 86.05% 870 Firefox 44.0b1 8.31% 84
Flags: needinfo?(overholt)
Given comment 8 I'm not sure who'd be best to look into this more. Benjamin, in the past I would have guessed dmajor; any suggestions?
Flags: needinfo?(overholt) → needinfo?(benjamin)
(In reply to Ted Mielczarek [:ted.mielczarek] from comment #8) > This is certainly puzzling! The full path to that file is > C:\Users\wawa\AppData\Local\Temp\{9A887E1C-4078-4827-9A31-AAFC133F05EC}.xpi Wondering if we can have this XPI.
FWIW, it's not really an XPI, it's a DLL file disguised as an XPI. Apparently the malware that distributes this file also sometimes calls it "plugin.exe" or "plugin-container.exe". The page I linked in comment 8 says the software is called "Nugget Find", but I could not find anywhere to download an installer. Various pages claim that it's installed as a drive-by packaged in other software's installers.
I don't see why this bug needs to be marked s-s. If this weren't a topcrash, I'd recommend WONTFIX. As a topcrash, we would take a DLL blocklist or an addon blocklist fix if that could be effective. If this is a random DLL name, though, we don't have enough for a blocklist. Best bet might be to reach out and try to get this added to Windows Defender; I think Kev may have contacts for that. Mostly useful if there is an actual sample of the malware, though.
Flags: needinfo?(benjamin)
Group: dom-core-security
Whiteboard: [malware?]
(In reply to Benjamin Smedberg [:bsmedberg] from comment #13) > Best bet might be to reach out and try to get this added to Windows > Defender; I think Kev may have contacts for that. Mostly useful if there is > an actual sample of the malware, though. Kev, what say you?
Flags: needinfo?(kev)
This doesn't look like a top crasher anymore (but I could be mis-reading crash-stats). Ritu, should we continue to track it?
Flags: needinfo?(rkothari)
Actually, I think this can be closed. Volume has basically dropped apart from a handful of crashes (3 in Beta over the last week). Attached is a visualization showing the curve for this crash over the last six months.
I'm going to go ahead and close this as per my previous comment. Feel free to reopen if you think this bug needs further action.
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WORKSFORME
(In reply to Andrew Overholt [:overholt] from comment #15) > This doesn't look like a top crasher anymore (but I could be mis-reading > crash-stats). Ritu, should we continue to track it? Hi Andrew, yup, this crash is basically very low volume now. We hit it only 11 times in the past week and not on late 44 beta builds at all. With that I am willing to mark this as fixed.
Flags: needinfo?(rkothari)
Flags: needinfo?(kev)
Component: DOM → DOM: Core & HTML
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: