Closed Bug 307725 Opened 19 years ago Closed 19 years ago

SECURITY flaw exposed by Tom Ferris

Categories

(Firefox :: General, defect)

x86
Linux
defect
Not set
critical

Tracking

()

VERIFIED DUPLICATE of bug 307259

People

(Reporter: softexpert, Unassigned)

References

()

Details

Attachments

(1 file)

User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b4) Gecko/20050909 Firefox/1.4 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b4) Gecko/20050909 Firefox/1.4 Someone brought up on Mozillazine this security issue. It can be found on: http://news.com.com/Unpatched+Firefox+flaw+may+expose+users/2100-1002_3-5856201.html?tag=nefd.top http://secunia.com/advisories/16764/ http://security-protocols.com/advisory/sp-x17-advisory.txt Reproducible: Always Steps to Reproduce: 1. Make sure you don't have anything to loose on the browser 2. Load attached file 3. Freeze You need to kill the process Actual Results: On console I got this output: *** glibc detected *** ./firefox-bin: realloc(): invalid next size: 0x0a9f4bc8 *** ======= Backtrace: ========= /lib/libc.so.6[0xc36045] /lib/libc.so.6(__libc_realloc+0x101)[0xc36a30] ./libxpcom_core.so(_ZN14nsStringBuffer7ReallocEPS_j+0x20)[0x32f53c] ./libxpcom_core.so(_ZN12nsCSubstring10MutatePrepEjPPcPj+0xce)[0x33075a] ./libxpcom_core.so(_ZN12nsCSubstring11SetCapacityEj+0x7c)[0x3310f6] ./libxpcom_core.so(_ZN12nsCSubstring9SetLengthEj+0x1b)[0x331189] ./firefox-bin[0x80db586] ./firefox-bin[0x80dc883] ./firefox-bin[0x80df53c] ./firefox-bin[0x8111b1e] ./firefox-bin[0x80d3328] ./firefox-bin[0x8323f81] ./firefox-bin[0x8371f6b] ./firefox-bin[0x82cad9e] ./firefox-bin[0x82ab4a6] ./firefox-bin[0x82c6372] ./firefox-bin[0x81f9d57] ./firefox-bin[0x81fae9c] ./firefox-bin[0x81fca7c] ./firefox-bin[0x8220e1d] ./firefox-bin[0x832d5f4] ./firefox-bin[0x8380b4d] ./firefox-bin[0x837d2dc] ./firefox-bin[0x837ed73] ./firefox-bin[0x816f051] ./firefox-bin[0x816f300] ./firefox-bin[0x816f3a9] ./firefox-bin[0x816f665] ./firefox-bin[0x816bf1a] ./firefox-bin[0x817b9f6] ./firefox-bin[0x817c857] ./firefox-bin[0x817d5b5] ./firefox-bin[0x84e8738] ./firefox-bin[0x8106747] ./firefox-bin[0x80d1afd] ./firefox-bin[0x80d1871] ./libxpcom_core.so(_ZN23nsInputStreamReadyEvent12EventHandlerEP7PLEvent+0x30)[0x305684] ./libxpcom_core.so(PL_HandleEvent+0x1d)[0x31685f] ./libxpcom_core.so(PL_ProcessPendingEvents+0x70)[0x3167b2] ./libxpcom_core.so[0x317ddf] ./firefox-bin[0x81eb880] /usr/lib/libglib-2.0.so.0[0x1974fc] /usr/lib/libglib-2.0.so.0(g_main_context_dispatch+0x1dc)[0x1714ce] /usr/lib/libglib-2.0.so.0[0x1744d6] /usr/lib/libglib-2.0.so.0(g_main_loop_run+0x1a1)[0x1747c3] /usr/lib/libgtk-x11-2.0.so.0(gtk_main+0xb4)[0x44fa46] ./firefox-bin[0x81ebb24] ./firefox-bin[0x862e1ae] ./firefox-bin[0x807a848] ./firefox-bin[0x8076c8b] /lib/libc.so.6(__libc_start_main+0xdf)[0xbe5d5f] ./firefox-bin[0x8076be9] ======= Memory map: ======== 00111000-00113000 r-xp 00000000 03:0c 47408 /opt/MozillaFirefox/libplds4.so 00113000-00114000 rwxp 00001000 03:0c 47408 /opt/MozillaFirefox/libplds4.so 00114000-00122000 r-xp 00000000 03:0b 273208 /lib/libpthread-2.3.5.so 00122000-00123000 r-xp 0000d000 03:0b 273208 /lib/libpthread-2.3.5.so 00123000-00124000 rwxp 0000e000 03:0b 273208 /lib/libpthread-2.3.5.so 00124000-00126000 rwxp 00124000 00:00 0 00126000-0013a000 r-xp 00000000 03:0d 1043124 /usr/lib/libatk-1.0.so.0.901.0 0013a000-0013d000 rwxp 00014000 03:0d 1043124 /usr/lib/libatk-1.0.so.0.901.0 0013d000-00142000 r-xp 00000000 03:0d 1042801 /usr/lib/libpangoxft-1.0.so.0.800.1 00142000-00143000 rwxp 00005000 03:0d 1042801 /usr/lib/libpangoxft-1.0.so.0.800.1 00143000-0014d000 r-xp 00000000 03:0d 1042830 /usr/lib/libpangox-1.0.so.0.800.1 0014d000-0014e000 rwxp 00009000 03:0d 1042830 /usr/lib/libpangox-1.0.so.0.800.1 0014e000-001d2000 r-xp 00000000 03:0d 1439306 /usr/lib/libglib-2.0.so.0.600.6 001d2000-001d7000 rwxp 00084000 03:0d 1439306 /usr/lib/libglib-2.0.so.0.600.6 001d7000-001de000 r-xp 00000000 03:0d 911058 /usr/X11R6/lib/libXrender.so.1.2.2 001de000-001df000 rwxp 00007000 03:0d 911058 /usr/X11R6/lib/libXrender.so.1.2.2 001df000-001e8000 r-xp 00000000 03:0b 273204 /lib/libgcc_s-4.0.1-20050727.so.1 001e8000-001e9000 rwxp 00009000 03:0b 273204 /lib/libgcc_s-4.0.1-20050727.so.1 001e9000-0026c000 r-xp 00000000 03:0c 47403 /opt/MozillaFirefox/libmozjs.so 0026c000-00271000 rwxp 00083000 03:0c 47403 /opt/MozillaFirefox/libmozjs.so 00271000-0028f000 r-xp 00000000 03:0c 47412 /opt/MozillaFirefox/libssl3.so 0028f000-00291000 rwxp 0001d000 03:0c 47412 /opt/MozillaFirefox/libssl3.so 00291000-00294000 r-xp 00000000 03:0d 911067 /usr/X11R6/lib/libXrandr.so.2.0 00294000-00295000 rwxp 00002000 03:0d 911067 /usr/X11R6/lib/libXrandr.so.2.0 00295000-0029c000 r-xp 00000000 03:0d 911089 /usr/X11R6/lib/libXi.so.6.0 0029c000-0029d000 rwxp 00006000 03:0d 911089 /usr/X11R6/lib/libXi.so.6.0 0029d000-0029f000 r-xp 00000000 03:0d 911877 ./run-mozilla.sh: line 131: 26587 Killed "$prog" ${1+"$@"} Expected Results: A link should be rendered or an error message should be displayed
This is the testcase that will perform as expected: browser will freeze! You will need to kill the process.
*** This bug has been marked as a duplicate of 307259 ***
Status: UNCONFIRMED → RESOLVED
Closed: 19 years ago
Resolution: --- → DUPLICATE
Group: security
Tom Ferris himself reported that he already filed a bug : <http://security-protocols.com/advisory/sp-x17-advisory.txt>. There's no reason to report this again.
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: