DoS vulnerabilities in Mozilla Firefox, Internet Explorer and Chrome
- From: "MustLive" <mustlive@xxxxxxxxxxxxxxxxxx>
- Date: Fri, 21 Aug 2009 20:58:21 +0300
I want to warn you about Denial of Service vulnerability in Mozilla Firefox,
Internet Explorer and Chrome.
At the end of December DoS vulnerability in Mozilla Firefox 3.0.5 was found
by Jeremy Brown (http://websecurity.com.ua/2755/). After I checked at
23.12.2008 this vulnerability in different browsers (and also yesterday in
new version of Firefox), I found that this Denial of Service vulnerability
also exists in Firefox 3.0.13, Internet Explorer 6 and Chrome 188.8.131.52.
Original exploit (http://www.milw0rm.com/exploits/7554).
Use Google's cache because milw0rm.com is not working now
With html file generated by this exploit in all affected browsers there is
consuming of CPU resources (and some consuming of RAM resources, besides in
those browsers, where there is no freeze, after closing of tab with exploit
the memory is not released, so large amount of memory stays in use until
closing of the browser).
In Mozilla Firefox 3.0.5 and previous versions there is CPU Overload with
freezing, at this in Firefox 3.0.13 there is only CPU Overload. In IE6 the
exploit leads to CPU Overload with freezing. In Chrome 184.108.40.206 and
previous versions the exploit leads to CPU Overload. But if to open empty
tab and to close tab with the exploit, then on empty tab the browser can
take 100% of CPU and freezes.
Vulnerable version is Mozilla Firefox 3.0.13 and previous versions (and also
must Firefox 3.5.x).
Vulnerable version is Internet Explorer 6 (6.0.2900.2180) and previous
versions. And potentially next versions (IE7 and IE8).
Vulnerable version is Google Chrome 220.127.116.11 and previous versions (and
potentially next versions).
I mentioned about these vulnerabilities at my site
Best wishes & regards,
Administrator of Websecurity web site
- Prev by Date: Cuteflow Version 2.10.3 "edituser.php" Security Bypass Vulnerability
- Next by Date: FreeBSD <= 6.1 kqueue() NULL pointer dereference
- Previous by thread: Cuteflow Version 2.10.3 "edituser.php" Security Bypass Vulnerability
- Next by thread: FreeBSD <= 6.1 kqueue() NULL pointer dereference