Closed
Bug 665518
Opened 14 years ago
Closed 14 years ago
Websocket Data Framing crash [@mozilla::net::nsWebSocketHandler::ApplyMask]
Categories
(Core :: Networking: WebSockets, defect)
Tracking
()
RESOLVED
FIXED
mozilla7
Tracking | Status | |
---|---|---|
firefox6 | + | fixed |
status1.9.2 | --- | unaffected |
status1.9.1 | --- | unaffected |
People
(Reporter: posidron, Assigned: mcmanus)
References
Details
(Whiteboard: [sg:critical?])
Attachments
(2 files)
2.97 KB,
text/plain
|
Details | |
1.30 KB,
patch
|
Biesinger
:
review+
christian
:
approval-mozilla-aurora+
|
Details | Diff | Splinter Review |
Received connection: ('127.0.0.1', 61673)
HTTP/1.1 101 Switching Protocols
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Accept: x6X5fx2b1lAIM7QZxYAlCH7GW6c=
Sending: b'\t\xff\xfe\x81\x05Hello'
Assignee | ||
Comment 2•14 years ago
|
||
section 4.2 says that the most-significant-bit of a 64 bit length must be 0.. (0xfe is the MSB of the length field above) and we are missing a check to enforce that.. failing to do so led to a quantity going negative and then various length checks failing.
Assignee | ||
Comment 3•14 years ago
|
||
Updated•14 years ago
|
Attachment #540471 -
Flags: review?(cbiesinger) → review+
Comment 4•14 years ago
|
||
is there a particular reason that PRInt64 payloadLength is signed ?
Assignee | ||
Updated•14 years ago
|
Whiteboard: [inbound]
Comment 5•14 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 14 years ago
Resolution: --- → FIXED
Whiteboard: [inbound]
Assignee | ||
Updated•14 years ago
|
Attachment #540471 -
Flags: approval-mozilla-aurora?
Assignee | ||
Comment 7•14 years ago
|
||
for the aurora review: this bug is found as part of websockets fuzz testing as part of the security review. yea for fuzz testing!
Comment on attachment 540471 [details] [diff] [review]
63 bit lengths v1
Approved for releases/mozilla-aurora
Attachment #540471 -
Flags: approval-mozilla-aurora? → approval-mozilla-aurora+
Assignee | ||
Comment 9•14 years ago
|
||
status-firefox6:
--- → fixed
status1.9.1:
--- → unaffected
status1.9.2:
--- → unaffected
Comment 10•14 years ago
|
||
assuming worst-case sg:critical since it looks like we can overwrite heap data in ApplyMask() if we don't die reading out of bounds first.
Whiteboard: [sg:critical?]
Target Milestone: --- → mozilla7
Updated•13 years ago
|
Group: core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•