Closed Bug 330893 Opened 19 years ago Closed 19 years ago

Firefox Bug in Javascript and Buffer Overflow

Categories

(Core :: JavaScript Engine, defect)

x86
Windows XP
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 112858

People

(Reporter: guelfoweb, Unassigned)

References

()

Details

(Keywords: hang, Whiteboard: [sg:dos])

Attachments

(1 file)

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 If you run code without security extention (noscript, etc.) on Windows XP SP2, it generates a buffer owerflow. In order to finish the process you must kill the application from task bar. Code Javascript Exploit: -------------------------------------------------- <script language="JavaScript1.2" type="text/javascript"> function exploit() {} for (k=0;k<k+1;k++){document.write('<a href="javascript:exploit()");"><img src=""/</a></a>'); } </script> -------------------------------------------------- Reproducible: Always
Attached file testcase
I don't see an buffer overflow on trunk or 1.5.0.2, just a DOS like bug 320760 and transitively bug 317334. The test continually uses memory so there may be a out of memory or gc related crash someday
I also don't see any kind of buffer overflow here. It is annoying that the runaway-script detection is foiled by this, though -- it's a pretty effective DoS. Clearing the security flag, pointless since this is from a public blog.
Group: security
Status: UNCONFIRMED → NEW
Ever confirmed: true
Keywords: hang
Whiteboard: [sg:dos]
Component: JavaScript Console → JavaScript Engine
Product: Firefox → Core
Version: unspecified → Trunk
better dupe candidate: 112858 *** This bug has been marked as a duplicate of 112858 ***
Status: NEW → RESOLVED
Closed: 19 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: