lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <000d01c23016$4ea8e320$e62d1c41@kc.rr.com>
From: mattmurphy at kc.rr.com (Matthew Murphy)
Subject: Netscape Communicator META Refresh Denial of Service

The "META" tag can be used to specify several things, including
document properties, and HTTP headers.  Among the HTTP
header equivalents it can specify is a "Refresh" member.

Refresh has this syntax:

<meta http-equiv="refresh" content="[delay]; URL=[page]">

delay - A number of seconds to wait for reload.  If omitted,
no delay is observed and the page is refreshed immediately.

page - This is the URL to navigate to when the refresh occurs

If a META Refresh navigates to itself with no delay, Netscape
will loop, causing a stupid DoS.

I tested this on Netscape 6.2.1 for Win9x/Me, but other versions
may be vulnerable.

"The reason the mainstream is thought
of as a stream is because it is
so shallow."
                     - Author Unknown


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ