New issue
Advanced search Search tips

Issue 714380 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner:
Closed: Apr 2017
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: Bug-Security



Sign in to add a comment

Security: Denial of Service upon viewing a malicious website (possible remote code execution)

Reported by rbcomi...@gmail.com, Apr 22 2017

Issue description

If a user visits a malicious website with the following code(PoC) a DoS will occur resulting in memory corruption and possible remote code execution. 

Reproducible: Always

Steps to Reproduce:
1) Run exploit.html
2) Wait for the crash

Actual Results:  
Crash.

Expected Results:  
 
It shouldn't be crashed.

VERSION
57.0.2987.133 (Official Build) (64-bit)
Operating System: [Windows]


FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION
Type of crash: [tab]

 
Project Member

Comment 1 by ClusterFuzz, Apr 22 2017

ClusterFuzz is analyzing your testcase. Developers can follow the progress at https://cluster-fuzz.appspot.com/testcase?key=5339049884909568

Comment 2 by rbcomi...@gmail.com, Apr 23 2017

poc.rar
4.6 KB Download
This looks like a well-crafted exploit file. Am I correct in seeing that the target is Flash?

Comment 4 by rbcomi...@gmail.com, Apr 24 2017

Yes. 

Comment 5 by mea...@chromium.org, Apr 24 2017

Components: Internals>Plugins>Flash
Owner: natashenka@google.com
Status: Assigned (was: Unconfirmed)
natashenka@: Can you please take a look?
Components: -Internals>Plugins>Flash
Labels: Needs-Feedback
This didn't crash in Clusterfuzz. 

The comments in the script make reference to heap corruption via nsCSSValue, and the archive contains a file named FF3.6.3-v2.0.js and a Heapspray applet in Java, leading me to believe that this code is a really 7 year-old repro file for a CVE in Firefox's CSS handling. 

rbcomic12@ can you please explain?

Comment 8 by rbcomi...@gmail.com, Apr 24 2017

Yes, this is actually the same report. I'm actually confused, Why the browsers can't handle the code and gets crashed..Although, this was reported to frefox long time back, Why they haven't fixed it? So I thought to share with you guys.
Owner: elawrence@chromium.org
Assigning back to elawrence. It look like this bug isn't specific to Flash?
Status: WontFix (was: Assigned)
Re #8: Firefox fixed this bug in 2010, as noted in the link in #7. The bug relied upon a problem in handling of CSS arrays.

The vulnerable CSS codepath in question does not exist in Chrome. Additionally, Chrome does not support running Java (which was used in the proof-of-concept). 

The code will still hang the browser tab (as it allocates 100 Million array objects) but this does not represent a security bug (see e.g. https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Are-denial-of-service-issues-considered-security-bugs- ).

If you have evidence of "memory corruption" or anything beyond the simple "safely crashed tab", please do update this issue.
Project Member

Comment 11 by sheriffbot@chromium.org, Aug 1 2017

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment