RE: IE, Firefox, Opera DoS
From: GulfTech Security (security_at_gulftech.org)
To: <email@example.com> Date: Tue, 24 Aug 2004 18:59:19 -0500
Correct me if I am wrong, but isn't this just an exhaustion of resources and
not a "vulnerability" at all? You could have it write text to the page
into an infinite loop.
Does having your 486 freeze up when you attempt to open a 700mb DivX file
constitute as a vulnerability of the media software or operating system? I
think not. Here is a "one liner" I wrote that does the same thing, but I do
not in ANY way consider this a vulnerabity.
<script> var i = 1; while (i) </script>
From: Dan Pixley [mailto:firstname.lastname@example.org]
Sent: Monday, August 23, 2004 8:10 AM
To: email@example.com; firstname.lastname@example.org
Subject: Re: IE, Firefox, Opera DoS
Tested this in Mozilla 1.7.2 and Epiphany 1.2.6 in Linux (kernel 2.6.8,
Gentoo, Gnome 2.6.2).
Each browser comes up with a warning about running the script. The user
can chose to run it or not. Either way, a dialog box reloads over and
over until the main window is forced closed with xkill.
> Browser DoS through viewing of a malicious page that repeatedly loads
iframes of C:\Windows\System32 using 100% cpu
> Tested on Mozilla Firefox 0.9.3, Opera 7.54 and IE 6.0 - Opera gives
the error "The address type is unknown or unsupported" over and over