lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <MAILFIREWALL2CUaygF000000b4@mailfirewall2.csis.dk>
Date: Wed Sep 14 11:40:19 2005
From: kruse at krusesecurity.dk (Peter Kruse)
Subject: FireFox Host: Buffer Overflow is not
	justexploitable on FireFox

Hi Juha!

> I have informed the vendor Netscape being affected on 9th 
> September 2005.

I did the same on the 10th of September - still no reply nor official
statement from Netscape which makes me a little worried.
 
> 2)
> Disabling IDN support via about:config (or prefs.js file) is 
> possible in Netscape Browser 8 too. Xpi file for Firefox and 
> Mozilla Suite works in Netscape 8.0.3.3 too. Test was 
> successful and even UA was changed to include 
> ....Gecko/20050729 (No IDN) Netscape/8.0.3.3.
> However, the manual method is recommended.
> I.e. there is a workaround for Netscape. Vendor developer 
> team contacted during a weekend, no reply yet.

Correct. I reported that workaround on the 10th of September.

I did so using both the security address at netscape.com and the "submission
form" on Netscape's official webpage. I never got any reply/respons from
netscape. 

Netscape uses the same rendering engine as Firefox (unless explicitly told
to use IE) and as such, will also be vulnerable. The workaround, covered by
the Mozilla Team, will correct the problem simply by disabling IDN.

Regards
Peter Kruse


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ