[<prev] [next>] [day] [month] [year] [list]
Message-ID: <558f59870601051621t7fbfa8a2x1d96fea79f615423@mail.gmail.com>
Date: Fri Jan 6 00:29:49 2006
From: zeus.olimpusklan at gmail.com (zeus olimpusklan)
Subject: Mozilla Firefox image Buffer Overflow
Vulnerability
###########################################################################
# Advisory #4 Title: Mozilla Firefox image Buffer Overflow Vulnerability
#
#
# Author: 0o_zeus_o0
# Contact: zeus@...sdelared.com
# Website: Elitemexico.org
# Date: 05/01/2006
# Risk: High
# Vendor Url: http://www.mozilla.com/firefox/
# Affected Software: Firefox Web browser
# Non Affected:
#
# We Are: olimpus klan team
#
#TECHNICAL INFO
#================================================================
#
#the error consists of doing that the Web browser colapse being caused
#an error with the consultation of an image with with defects, like
#raising to a file html or another one and renombrar it to .gif or jpg.
#when doing this will say to the following message the image to us
#"http://urlsite.com/php.gif" cannot be, because it contains errors.
#when trying to copy the image and to give to cancel to the action, the
#Web browser caused to error closing automatically the windows
#
#
#VULNERABLE VERSIONS
#================================================================
# 1.5
#
#
#================================================================
#Contact information
#0o_zeus_o0
#zeus@...sdelared.com
#www.olimpusklan.org
#================================================================
#greetz: lady fire, fraude, xoxo, El_Mesias
##############################################################################
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060105/3280bb62/attachment.html
Powered by blists - more mailing lists