Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:9790
HistorySep 26, 2005 - 12:00 a.m.

[NEWS] Gecko based browsers Stack Corruption

2005-09-2600:00:00
vulners.com
17

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com

    • promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


Gecko based browsers Stack Corruption

SUMMARY

Lack of proper length and value checking allow attacker to cause a buffer
overflow and execute arbitrary code or cause a DoS using Gecko based web
browsers.

DETAILS

Vulnerable Systems:

  • Mozilla firefox 1.0.6 and prior
  • Netscape Browser version 8.0.3.3
  • K-Meleon Browser version 0.9

Immune Systems:

  • Mozilla firefox 1.0.7

Stack Corruption:
The problem existed in "zero-width non-joiner" sequence of unicode chars
that uses Arabic shaping style. Because the code did not checked for
buffer length before manipulating the given text. On a crafted content, it
is possible to cause the buffer to be twice the size the actual data, and
memory allocated for the buffer itself.

Proof of Concept:
< html>
< body>
& #8204;& #8204;&# 8204;& #8204;& #8204;& #8204;& #8204;& #8204;& #1742;
& #8204;& #8204;& #1740;& #8204;
< /body>
< /html>

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702&gt;
CAN-2005-2702

ADDITIONAL INFORMATION

The information has been provided by <mailto:[email protected]>
Juha-Matti Laurio .
The original article can be found at:
<http://www.mozilla.org/security/announce/mfsa2005-58.html&gt;
http://www.mozilla.org/security/announce/mfsa2005-58.html
The bug report can be found at:
<https://bugzilla.mozilla.org/show_bug.cgi?id=296134&gt;
https://bugzilla.mozilla.org/show_bug.cgi?id=296134

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]

====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.