Full Disclosure mailing list archives

Re: Firefox 2.0.0.3 Out-of-bounds memory access via specialy crafted html file


From: Alexander Bierbaumer <alex.bierbaumer () chello at>
Date: Tue, 1 May 2007 16:56:19 +0200

Same here on Gentoo with 2.6.19-beyond4

On Tue, 1 May 2007 16:29:35 +0300
Mihai Donțu <mdontu () bitdefender com> wrote:

On Tuesday 01 May 2007 10:26, carl hardwick wrote:
Product: Firefox 2.0.0.3
Description: Out-of-bounds memory access via specialy crafted html file
Type: Remote

Vulnerability can be exploited by using a large value in a href tag to
create an out-of-bounds memory access.

Proof Of Concept exploit:
http://www.critical.lt/research/opera_die_happy.html

    I don't know what this exploit is supposed to do (I assume crash the browser),
but my FF just fires up my CPU and... that's it :) I can close the tab or
click the Home button and everything goes back to normal.
    I have FF 2.0.3 (32bit) running on a 64bit Gentoo.

-- 
Mihai

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


-- 
Alexander Bierbaumer <alex.bierbaumer () chello at>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: