Closed Bug 289134 Opened 20 years ago Closed 20 years ago

arbitrary exposure of process space memory to javascript code.

Categories

(SeaMonkey :: Security, defect)

x86
Windows XP
defect
Not set
major

Tracking

(Not tracked)

VERIFIED DUPLICATE of bug 288688

People

(Reporter: kennedyh, Assigned: dveditz)

References

()

Details

User-Agent:       Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050319
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050319

as detailed at the above advisory url, javascript in mozilla is able to extract
previous contents of memory within the process space.

Reproducible: Always

Steps to Reproduce:
1. go to the above url with javacript enabled
2. click on the "Test Now - Left Click On This Link" link
3. observe some of the contents of your process space.

Actual Results:  
i observed a number of font/url/text items from previous browsing activities.

Expected Results:  
shown a text box full of "X"s
This the observed behavior in IE.
The secunia report actually contained the bug number in bugzilla.

*** This bug has been marked as a duplicate of 288688 ***
Status: NEW → RESOLVED
Closed: 20 years ago
Resolution: --- → DUPLICATE
excellent! none of the searches i did from the bugzilla page 
for "lambda" or "SA14821" turn up any results, and there is no mention of a vendor
contact on the secunia page.

good to see it's fixed already :-)
Group: security
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.