[NEWS] Gecko legend object DoS



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Gecko legend object DoS
------------------------------------------------------------------------


SUMMARY

Gecko does not handle properly the HTML tags of headers inside legend,
allowing attackers to crash Gecko based browsers.

DETAILS

Vulnerable Systems:
* Mozilla Firefox 1.5.0.1 and prior
* Mozilla Suite 1.0.7 and prior

Immune Systems:
* Mozilla Firefox 1.5.0.2
* Mozilla Suite 1.0.8

A Null Pointer Dereference exists with the way Gecko handles the <legened>
tags.

Proof of Concept:
< legend>
< kbd>
< object>
< h4>
< / object>
< / kbd>

The vulnerability exists with the use of header tag (<h4> on the above
PoC).

Vendor Status:
The vendor has issued a fix with the new Mozilla based products.

Disclosure Timeline:
01 Oct 05 - DoS vulnerability discovered.
15 Dec 05 - Vendor contacted.
15 Dec 05 - Vendor confirmed vulnerability.
02 Feb 06 - Fixed on 1.x branches.
12 Apr 06 - Public release.


ADDITIONAL INFORMATION

The information has been provided by <mailto:bugtraq@xxxxxxxxxxxx> Thomas
Waldegger.
The original article can be found at:
<http://morph3us.org/advisories/20060412-firefox-1501.txt>
http://morph3us.org/advisories/20060412-firefox-1501.txt



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Openfire Jabber-Server Multiple Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... filter which is responsible for authentication could be completely ... SQL injection vulnerability. ... Since the vendor didn't release a patch within the last 6 months it is ...
    (Securiteam)
  • [NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Trend Micro HouseCall ActiveX Control Arbitrary Code Execution ... The vulnerability is caused due to an implementation error within the ... 18/08/2008 - Vendor notified. ...
    (Securiteam)
  • [NT] CA ARCserve Backup RPC "handle_t" Argument Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CA ARCserve Backup RPC "handle_t" Argument Vulnerability ... 24/10/2007 - Vendor notified. ... 21/05/2008 - Vendor notifies expected release in October 2008. ...
    (Securiteam)
  • [UNIX] Multiple Vendor ImageMagick Sign Extension Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple Vendor ImageMagick Sign Extension Vulnerability ...
    (Securiteam)
  • [UNIX] Happymall E-Commerce Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Revin Aldi reported an input validation vulnerability in the Happymall ... The vendor reports that the 'member_html.cgi' script is also affected. ...
    (Securiteam)