Closed Bug 289134 Opened 20 years ago Closed 20 years ago

arbitrary exposure of process space memory to javascript code.

Categories

(SeaMonkey :: Security, defect)

x86
Windows XP
defect
Not set
major

Tracking

(Not tracked)

VERIFIED DUPLICATE of bug 288688

People

(Reporter: kennedyh, Assigned: dveditz)

References

()

Details

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050319 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050319 as detailed at the above advisory url, javascript in mozilla is able to extract previous contents of memory within the process space. Reproducible: Always Steps to Reproduce: 1. go to the above url with javacript enabled 2. click on the "Test Now - Left Click On This Link" link 3. observe some of the contents of your process space. Actual Results: i observed a number of font/url/text items from previous browsing activities. Expected Results: shown a text box full of "X"s This the observed behavior in IE.
The secunia report actually contained the bug number in bugzilla. *** This bug has been marked as a duplicate of 288688 ***
Status: NEW → RESOLVED
Closed: 20 years ago
Resolution: --- → DUPLICATE
excellent! none of the searches i did from the bugzilla page for "lambda" or "SA14821" turn up any results, and there is no mention of a vendor contact on the secunia page. good to see it's fixed already :-)
Group: security
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.