Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 109580 - www-client/mozilla-firefox: DoS weakness + exploit
Summary: www-client/mozilla-firefox: DoS weakness + exploit
Status: RESOLVED UPSTREAM
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Mozilla Gentoo Team
URL:
Whiteboard:
Keywords:
: 109778 (view as bug list)
Depends on:
Blocks:
 
Reported: 2005-10-17 08:35 UTC by Carsten Lohrke (RETIRED)
Modified: 2006-07-30 06:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carsten Lohrke (RETIRED) gentoo-dev 2005-10-17 08:35:59 UTC
Tom Ferris has discovered a weakness in Firefox, which can be exploited by
malicious people to cause a DoS (Denial of Service).

The weakness is caused due to an error in the handling of overly large size
attributes in the "Iframe" tag. This can be exploited to crash a vulnerable
browser via a specially crafted "Iframe" tag on a malicious web site.

The weakness has been confirmed in version 1.0.7 on Fedora Core 4 (Linux). Other
versions and platforms may also be affected.

NOTE: The vendor has concluded that the weakness is caused due to an infinite
recursion which causes a stack overflow, which only can be exploited to crash a
vulnerable browser and cannot be exploited for code execution.

http://secunia.com/advisories/17071/


milw0rm.com have released proof of concept code for a denial of service exploit
which apparently affects all versions of the Mozilla Foundations popular Firefox
browser from version 1.0.7 downward (For the dim this INCLUDES Firefox 1.0.7).
If this exploit has made it out into, or indeed been retrieved from the wild is
unknown at this time. However it is clear that this exploit will indeed need
patching as soon as possible - it does cause a nasty software loop/crash.

http://www.whitedust.net/newsview.php?NewsID=1432
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-10-17 08:58:26 UTC
We usually do not consider client DoS as vulnerabilities. There is "Service" in
Denial of Service and I can't think of a service you miss by crashing while
visiting some evil web page. My take on this is let the fix filter from FF usual
updates.
Comment 2 Carsten Lohrke (RETIRED) gentoo-dev 2005-10-17 16:14:08 UTC
Right, I was a bit quick with this.
Comment 3 Carsten Lohrke (RETIRED) gentoo-dev 2005-10-19 05:55:55 UTC
*** Bug 109778 has been marked as a duplicate of this bug. ***
Comment 4 Stuart Longland (RETIRED) gentoo-dev 2006-07-30 06:38:42 UTC
This has been fixed upstream.

https://bugzilla.mozilla.org/show_bug.cgi?id=303433