Closed Bug 575911 Opened 15 years ago Closed 15 years ago

IFRAME EXPLOIT IN 3.6.6

Categories

(Firefox :: Security, defect)

x86
Windows Vista
defect
Not set
critical

Tracking

()

RESOLVED DUPLICATE of bug 344267

People

(Reporter: alan.cocox, Unassigned)

References

()

Details

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.2.6) Gecko/20100625 Firefox/3.6.6 (.NET CLR 3.5.30729) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.2.6) Gecko/20100625 Firefox/3.6.6 (.NET CLR 3.5.30729) The exploit as described in 543279 - continues to exist. When loading the pornographic website www.xtube.com - it exploits the iframe exploit and executes a PDF file, which in turn exploits a PDF vulnerability. I also was presented with a network login box that hinted that i should use the password "DDoS" (with the username being the same). Not sure what is going on. Reproducible: Always Steps to Reproduce: 1. Log on to www.xtube.com (in FireFox). Actual Results: Infection/hijacking. Expected Results: ..safety. SCREEN SHOTS: AV detection: http://i46.tinypic.com/w6v241.jpg AV detection: http://i49.tinypic.com/i3b6zt.jpg AV LOG: http://i49.tinypic.com/219bdjo.jpg Strange log in box: http://i49.tinypic.com/k1sbag.jpg
That bug is still open. Please don't file deliberate duplicates.
Status: UNCONFIRMED → RESOLVED
Closed: 15 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.