lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <45EAFC8E.2090907@bindshell.net>
Date: Sun, 04 Mar 2007 17:06:22 +0000
From: mark <mark@...dshell.net>
To: bugtraq@...urityfocus.com
Subject: Konqueror DoS Via JavaScript Read Of FTP Iframe

Summary

Konqueror crashes if JavaScript code tries to read the source of a child
iframe which is set to an ftp:// URL.


Impact

It is possible for malicious websites to crash Konqueror and possibly
other applications with rely on KJS.


Details

The KDE JavaScript implementation, KJS has been found to crash when it
tries to read the contents of an FTP iframe.  This can be demonstrated
by creating a web page with an iframe with a src of
"ftp://localhost/anything", then reading the contents of this iframe
with JavaScript similar to the following.  (A working FTP server is not
required).

var contents =
document.getElementById(iframe_name).contentWindow.document.body.innerHTML;


Exploit

Proof of concept code is available at:
http://bindshell.net/advisories/konq355


Vulnerable Versions

This vulnerability has been tested on Gentoo and Debian running KDE 3.5.5.


Reported By

mark@...dshell.net
http://bindshell.net/advisories/konq355


Disclosure Timeline

2007-02-03  Vulnerability reported to security@....org
2007-02-28  KDE team recreate bug and produce preliminary patch for
nodes.cpp
2007-03-01  KDE team produced updated patch for ecma/kjs_html.cpp
2007-03-04  Public advisory released


Patch Information

The latest patch received from the KDE team is available from:
http://bindshell.net/advisories/konq355/konq355-patch.diff

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ