lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <93dbed490604140348m15d884a2vf5bee4ccfce19797@mail.gmail.com> Date: Fri Apr 14 11:49:01 2006 From: easy.mask at gmail.com (izi) Subject: Camino Browser HTML Parsing Null Pointer Dereference Denial of Service Vulnerability //----- Advisory Program : Camino Browser Homepage : http://www.caminobrowser.org Tested version : <= 1.0 Found by : Simon MOREL <philemon at thehackademy dot net> This advisory : Simon MOREL <philemon at thehackademy dot net> Discovery date : 2006/04/13 //----- Application description The Camino Project has worked to create a browser that is as functional and elegant as the computers it runs on. The Camino web browser is powerful and ready to meet the needs of all users while remaining simple and elegant in its design.. //----- Description of vulnerability Camino Browser is prone to a denial-of-service condition when parsing certain malformed HTML content. //----- Proof Of Concept <legend> <kbd> <object> <h4> </object> </kbd> //----- Solution Not Yet. //----- Impact Successful exploitation will cause the browser to crash. //----- Credits Simon MOREL <philemon at thehackademy dot net> http://www.sysdream.com //----- Greetings Thomas Waldegger <bugtraq at morph3us dot org>