lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 25 Feb 2005 09:36:37 -0800 From: "Eric McCarty" <eric@...eduncan.com> To: "mikx" <mikx@...x.de>, <full-disclosure@...ts.netsys.com>, <bugtraq@...urityfocus.com>, <NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM> Subject: RE: Firescrolling [Firefox 1.0] Confirmed Exploit works in Firefox 1.0, however on a side note Microsoft Anti-spyware prevented the script from executing. Eric McCarty Systems Administrator Internet Security Officer -----Original Message----- From: mikx [mailto:mikx@...x.de] Sent: Friday, February 25, 2005 12:11 AM To: full-disclosure@...ts.netsys.com; bugtraq@...urityfocus.com; NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM Subject: Firescrolling [Firefox 1.0] __Summary Remember my Internet Explorer "scrollbar exploit" based on http-equiv's "What a Drag"? When will people ever learn that "unusual user interaction" can be hidden by common tasks... Let's combine fireflashing, firetabbing, xul and javascript to run arbitrary code by dragging a scrollbar two times. __Proof-of-Concept http://www.mikx.de/firescrolling/ __Status The exploit is based on multiple vulnerabilities: bugzilla.mozilla.org #280664 (fireflashing) bugzilla.mozilla.org #280056 (firetabbing) bugzilla.mozilla.org #281807 (firescrolling) Upgrade to Firefox 1.0.1 or disable javascript. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0527 to this issue. __Affected Software Tested with Firefox 1.0 on Windows and Linux (Fedora Core) __Contact Informations Michael Krax <mikx@...x.de> http://www.mikx.de/?p=11 mikx _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists