Closed
Bug 1765679
Opened 3 years ago
Closed 3 years ago
Crash Browser DoS
Categories
(Firefox :: Security, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 1765678
People
(Reporter: ricardo.bughunter, Unassigned)
References
()
Details
(Keywords: reporter-external, Whiteboard: [reporter-external] [client-bounty-form] [verif?])
When a user accesses a malicious link containing this payload, a recursive javascript function is executed, which performs bulk requests causing an overload of memory entries, causing the browser to stop working and totally polluting the browsing history. This script contains a repetition counter generating a recursive redirection counter generating massive buffer overflow entries executed.
Flags: sec-bounty?
Reporter | ||
Updated•3 years ago
|
Points: --- → 13
Has Regression Range: --- → irrelevant
OS: Unspecified → All
Hardware: Unspecified → All
Version: unspecified → Firefox 101
Comment 1•3 years ago
|
||
Please don't modify bug metadata.
Looks like a double-submit.
Status: UNCONFIRMED → RESOLVED
Points: 13 → ---
Closed: 3 years ago
Flags: sec-bounty?
Resolution: --- → DUPLICATE
Reporter | ||
Comment 2•3 years ago
|
||
Ok
Updated•4 months ago
|
Keywords: reporter-external
Updated•20 days ago
|
Group: firefox-core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•