oss-sec mailing list archives

Re: regarding CVE-2008-4382 & CVE-2008-4381


From: "Steven M. Christey" <coley () linus mitre org>
Date: Fri, 3 Oct 2008 16:00:08 -0400 (EDT)


On Fri, 3 Oct 2008, Nico Golde wrote:

looking at the PoC this would work in every browser
supporting JavaScript as this is just a trivial memory
consumption issue by passing a very large string too the
alert function and thus eating memory, a simple
while(true){} would be equally effective for eating cpu
cycles which I wouldn't consider as a vulnerability
either...

I usually wouldn't call it a vulnerability, either.  However, based on our
analysis, the String.fromCharCode(550) creates a Unicode string for
character 550, but the escape() for URL encoding can only cover 0 to 255,
so it seemed like something else was going on here, maybe the alert
function not working.

I don't know how Javascript manages large strings, but it seems like
somewhere around the "x4 += x4;" statement, you exceed multiple gigs.  So
maybe the alert function isn't even being reached...

- Steve


Current thread: