Closed
Bug 575911
Opened 15 years ago
Closed 15 years ago
IFRAME EXPLOIT IN 3.6.6
Categories
(Firefox :: Security, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 344267
People
(Reporter: alan.cocox, Unassigned)
References
()
Details
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.2.6) Gecko/20100625 Firefox/3.6.6 (.NET CLR 3.5.30729)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.2.6) Gecko/20100625 Firefox/3.6.6 (.NET CLR 3.5.30729)
The exploit as described in 543279 - continues to exist.
When loading the pornographic website www.xtube.com - it exploits the iframe exploit and executes a PDF file, which in turn exploits a PDF vulnerability. I also was presented with a network login box that hinted that i should use the password "DDoS" (with the username being the same).
Not sure what is going on.
Reproducible: Always
Steps to Reproduce:
1. Log on to www.xtube.com (in FireFox).
Actual Results:
Infection/hijacking.
Expected Results:
..safety.
SCREEN SHOTS:
AV detection:
http://i46.tinypic.com/w6v241.jpg
AV detection:
http://i49.tinypic.com/i3b6zt.jpg
AV LOG:
http://i49.tinypic.com/219bdjo.jpg
Strange log in box:
http://i49.tinypic.com/k1sbag.jpg
Comment 1•15 years ago
|
||
That bug is still open. Please don't file deliberate duplicates.
Status: UNCONFIRMED → RESOLVED
Closed: 15 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•