Bugtraq mailing list archives
Re: MS Internet Explorer 7 Denial Of Service Exploit
From: Nick Kirby <nick.kirby () smoothwall net>
Date: Sat, 22 Nov 2008 20:39:58 +0000
craig () airnet net wrote:
Could you be a bit more specific as to the circumstances of the DOS exploit and how this could be replicated?On Konqueror 3.5.9, what happens is that this childish code builds a huge string, eats memory, causes swapping, and finally blows away Konq. Linux and X and everything else stay up and recover nicely. (Gentoo/AMD64X2/3G mem) This isn't an exploit -- at least not on Linux -- it's just kiddie stupidity. It doesn't take any particular cleverness to blow memory by dynamically creating bigger and bigger data structures. With virtual memory and 64-bit pointers, when exactly do we return -ENOMEM?
Thank you.
Current thread:
- Re: Re: MS Internet Explorer 7 Denial Of Service Exploit craig (Nov 22)
- Re: MS Internet Explorer 7 Denial Of Service Exploit Nick Kirby (Nov 24)
- Re: Re: MS Internet Explorer 7 Denial Of Service Exploit Glynn Clements (Nov 24)
- <Possible follow-ups>
- Re: Re: Re: MS Internet Explorer 7 Denial Of Service Exploit 0xjbrown41 (Nov 24)