lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 02 Nov 2006 20:01:19 +0100 From: Jerome Athias <jerome.athias@...e.fr> To: 3APA3A <3APA3A@...URITY.NNOV.RU> Cc: xxxx@...il.com, bugtraq@...urityfocus.com Subject: Re: New Flaw in Firefox 2.0: DoS and possible remote code execution 3APA3A a écrit : > Dear xxxx@...il.com, > > NULL pointer dereference is not exploitable to code execution by itself. > > Hi, you should be interested by this http://metasploit.blogspot.com/2006/08/putting-fun-in-browser-fun.html + a little tool https://www.securinfos.info/outils-securite-hacking/uSEH.rar /JA