-
April 5th, 2005, 01:15 PM
#1
** HEAD'S UP ** FireFox Java Vulnerability
Greeting's
A new vulnerability has been discovered in Mozilla FireFox V 1.x which can be used remotely to gain access to potentianlly sensitive information.
Original Advisory : https://bugzilla.mozilla.org/show_bug.cgi?id=288688
Other reference advisory : http://secunia.com/advisories/14820/
A proof of concept is found here : http://secunia.com/mozilla_products_...exposure_test/
Above link can be used to test if your system is vulnerable to the exploit. Each time you click on the link 10 Kb of memory will read from your system. BUT NOTE I TRIED IT MORE THEN 6 TIMES AND MY BROWSER CRASHED.
Currently no patch is released but this vulnerability can be fixed by DISABLING JAVA SUPPORT.
Other Reference : http://cubic.xfo.org.ru/index.cgi?read=53004
This exploit is classified as : "Moderately critical".
-
April 5th, 2005, 01:32 PM
#2
Blast - That's got me!
Thanx for the heads up
Steve
IT, e-commerce, Retail, Programme & Project Management, EPoS, Supply Chain and Logistic Services. Yorkshire. http://www.bigi.uk.com
-
April 5th, 2005, 01:36 PM
#3
Interesting. Anyone got IE that could try it? It was effective against Mozilla but I'm curious if this is more a JRE issue than a browser issue.
-
April 5th, 2005, 01:41 PM
#4
Greeting's
I tried the test with IE (fully updated) but it only show's "xxxxxxxxx......." and almost endless xxxx..
Anyway I just want to know for all those useres who tried the proof of concept code did you your firefox crash and if yes after how many tries ? Mine crashes after reading 60 Kb of memory.
Parth Maniar,
CISSP, CISM, CISA, SSCP
*Thank you GOD*
Greater the Difficulty, SWEETER the Victory.
Believe in yourself.
-
April 5th, 2005, 01:45 PM
#5
I got up to 41 on my Firefox 1.0.1. My mozilla crashed the 1st time after 6 and then went endless on the 2nd try. Both of these are on Linux (RH9)
-
April 5th, 2005, 01:52 PM
#6
Senior Member
I dont know if I've even installed any java plugins for FF but I'll still disable it when I get home.
I tip my hat to you sir. (or madame)
I know your type, you think "I'll just get me a costume, rip off the neighborhood kids". Next thing you know, you've got a jet shaped like a skull with lasers on the front!
-The Monarch.
-
April 5th, 2005, 02:01 PM
#7
Greeting's
I am not sure what is the latest version of firefox on linux but on windows it is 1.0.2. And MsMittens same here i got up 30 in the second try.
Parth Maniar,
CISSP, CISM, CISA, SSCP
*Thank you GOD*
Greater the Difficulty, SWEETER the Victory.
Believe in yourself.
-
April 5th, 2005, 02:02 PM
#8
Byte: it's the same on Linux, I've just been lazy about updating my abuse machine (it's a machine I use in wargames classroom).
-
April 5th, 2005, 02:42 PM
#9
Re: ** HEAD'S UP ** FireFox Java Vulnerability
Originally posted here by ByTeWrangler
Currently no patch is released but this vulnerability can be fixed by DISABLING JAVA SUPPORT.
NO. The bug is in the JavaScript engine. Disabling Java has absolutely no effect (with regards to this bug). You should disable JavaScript support. Java and JavaScript are NOT the same thing...
Oliver's Law:
Experience is something you don't get until just after you need it.
-
April 5th, 2005, 02:51 PM
#10
javascript indeed
Source - http://secunia.com/advisories/14820/
The vulnerability is caused due to an error in the JavaScript engine, as a "lambda" replace exposes arbitrary amounts of heap memory after the end of a JavaScript string.
Good call!
Thanks for the info.
Yo!
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|