Full Disclosure mailing list archives

Re: Firefox 2.0.0.3 Out-of-bounds memory access via specialy crafted html file


From: Andrew Redman <aredman () education ucsb edu>
Date: Tue, 01 May 2007 14:29:26 -0700

Nothing exciting to report on OS X 10.4 / fully patched / PPC. Kind of 
broke the properties dialog for the link, and used some cpu, but 
definitely caused no crashing.

On WinXP Norton real time protection detected the file in cache as a 
'hack tool.' I disabled that, but Firefox refused to return to the page 
afterward.


 - Andrew

carl hardwick wrote:
Product: Firefox 2.0.0.3
Description: Out-of-bounds memory access via specialy crafted html file
Type: Remote

Vulnerability can be exploited by using a large value in a href tag to
create an out-of-bounds memory access.

Proof Of Concept exploit:
http://www.critical.lt/research/opera_die_happy.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
  

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: