lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5992E02B471E3B409D43C9A7585DA7FDAE1F23@brspo0412.atrame.deloitte.com>
From: leoandrade at deloitte.com (Andrade,
	Leonardo F. Buonsanti de (BR - IT Brazil))
Subject: RE: Firescrolling [Firefox 1.0]

Yes. It works on Firefox 1.0

-----Original Message-----
From: Eric McCarty [mailto:eric@...eduncan.com] 
Sent: sexta-feira, 25 de fevereiro de 2005 14:37
To: mikx; full-disclosure@...ts.netsys.com; bugtraq@...urityfocus.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Subject: RE: Firescrolling [Firefox 1.0]

Confirmed Exploit works in Firefox 1.0, however on a side note Microsoft
Anti-spyware prevented the script from executing.



Eric McCarty
Systems Administrator
Internet Security Officer


 

-----Original Message-----
From: mikx [mailto:mikx@...x.de] 
Sent: Friday, February 25, 2005 12:11 AM
To: full-disclosure@...ts.netsys.com; bugtraq@...urityfocus.com;
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Subject: Firescrolling [Firefox 1.0]

__Summary

Remember my Internet Explorer "scrollbar exploit" based on http-equiv's
"What a Drag"? When will people ever learn that "unusual user
interaction" 
can be hidden by common tasks...

Let's combine fireflashing, firetabbing, xul and javascript to run
arbitrary code by dragging a scrollbar two times.

__Proof-of-Concept

http://www.mikx.de/firescrolling/

__Status

The exploit is based on multiple vulnerabilities:

bugzilla.mozilla.org #280664 (fireflashing) bugzilla.mozilla.org #280056
(firetabbing) bugzilla.mozilla.org #281807 (firescrolling)

Upgrade to Firefox 1.0.1 or disable javascript.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0527 to this issue.

__Affected Software

Tested with Firefox 1.0 on Windows and Linux (Fedora Core)

__Contact Informations

Michael Krax <mikx@...x.de>
http://www.mikx.de/?p=11

mikx 
 
*Disclaimer:*
Essa mensagem (incluindo qualquer anexo) contem informacoes confidenciais para um individuo e fins especificos, e e protegida por lei. Se voce nao e o destinatario dessa mensagem, voce deve deleta-la. Qualquer divulgacao, copia ou distribuicao dessa mensagem, ou qualquer acao tomada baseada em tal, e estritamente proibida.
This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law. If you are not the intended recipient, you should delete this message. Any disclosure, copying, or distribution of this message, or the taking of any action based on it, is strictly prohibited.
This message (including any attachments) contains confidential information intended for a specific individual and
purpose, and is protected by law.  If you are not the intended recipient, you should delete this message - any
disclosure, copying, or distribution of this message, or the taking of any action based on it, is strictly prohibited.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ