Issue metadata
Sign in to add a comment
|
Security: Denial of Service upon viewing a malicious website (possible remote code execution)
Reported by
rbcomi...@gmail.com,
Apr 22 2017
|
||||||||||||||||||
Issue descriptionIf a user visits a malicious website with the following code(PoC) a DoS will occur resulting in memory corruption and possible remote code execution. Reproducible: Always Steps to Reproduce: 1) Run exploit.html 2) Wait for the crash Actual Results: Crash. Expected Results: It shouldn't be crashed. VERSION 57.0.2987.133 (Official Build) (64-bit) Operating System: [Windows] FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION Type of crash: [tab]
,
Apr 23 2017
,
Apr 24 2017
This looks like a well-crafted exploit file. Am I correct in seeing that the target is Flash?
,
Apr 24 2017
Yes.
,
Apr 24 2017
natashenka@: Can you please take a look?
,
Apr 24 2017
This didn't crash in Clusterfuzz. The comments in the script make reference to heap corruption via nsCSSValue, and the archive contains a file named FF3.6.3-v2.0.js and a Heapspray applet in Java, leading me to believe that this code is a really 7 year-old repro file for a CVE in Firefox's CSS handling. rbcomic12@ can you please explain?
,
Apr 24 2017
Yes, this is actually the same report. I'm actually confused, Why the browsers can't handle the code and gets crashed..Although, this was reported to frefox long time back, Why they haven't fixed it? So I thought to share with you guys.
,
Apr 24 2017
Assigning back to elawrence. It look like this bug isn't specific to Flash?
,
Apr 24 2017
Re #8: Firefox fixed this bug in 2010, as noted in the link in #7. The bug relied upon a problem in handling of CSS arrays. The vulnerable CSS codepath in question does not exist in Chrome. Additionally, Chrome does not support running Java (which was used in the proof-of-concept). The code will still hang the browser tab (as it allocates 100 Million array objects) but this does not represent a security bug (see e.g. https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Are-denial-of-service-issues-considered-security-bugs- ). If you have evidence of "memory corruption" or anything beyond the simple "safely crashed tab", please do update this issue.
,
Aug 1 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by ClusterFuzz
, Apr 22 2017