exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

csis2004-5.txt

csis2004-5.txt
Posted Oct 27, 2004
Authored by Peter Kruse | Site csis.dk

CSIS Security Advisory [CSIS2004-5) - Mozilla Firefox, Web-browser built for 2004, advanced e-mail and newsgroup client, IRC chat client, and HTML editing made simple. The Mozilla Firefox ships with several bugs, making it possible to crash the browser, eat up virtual memory, simply by hosting a binary renamed as html, on a remote website.

tags | advisory, remote, web
SHA-256 | 163f29c64acae2506c9dff29c09f7010060dd4fd8a815aff852ebc2480f8b3c2

csis2004-5.txt

Change Mirror Download
CSIS Security Advisory [CSIS2004-5):

Rendering binary file as HTML makes Mozilla Firefox stop responding or crash

Date Published: 10.25.2004

Summary
Mozilla Firefox, Web-browser built for 2004, advanced e-mail and newsgroup
client, IRC chat client, and HTML editing made simple. The Mozilla Firefox
shippes with several bugs, making it possible to crash the browser, eat up
virtual memory, simply by hosting a binary renamed as html, on a remote
website.

Vulnerability Class
The browser should remain responsive while displaying large files. Instead
it crashes and hangs and feeds on virtual memory which could cause the
operating system to become unstable.

Details
Internet Explorer, and other browsers, verifies the content of filetypes
before opening in the browser. Based on the content of the file, it decides
what application should be used to open/view the content of the file. This
is, by design, not the case with Mozilla based browsers. A malicious website
can host a large chunck of data, spoofed as a html file that Mozilla will
display within the browser window. Thereby effectively causing a crash on
systems visiting the website.

You can choose any file from your harddisk larger than 5MB, rename it as a
html file, upload it to a remote website, or simply open it directly from
your local harddrive. The result is the same: Mozilla will stop responding,
showing a lot of binary garbage (clearly understandable), before the user is
forced to either end the application or reboot the system.

In several test scenarios the system force feed all virtual memory causing
the system to become unstable. However, this all depends on the size of the
file viewed by the browser. To avoid the user from being suspicious while
the file loads and garbage is showed in the browser window you can format
the website in such a way, that binary code won't show. This way the browser
will show a blank page until it crashes and the system becomes unstable.
When viewed, the browser will load the binary without the users knowledge.
The fact that this bug can be trigged by sending the same file with 1024
ASCII characters pre-pended makes exploitation trivial.

Impact
Low-Medium: This is a remote DoS in Mozilla Firefox. There are several other
ways to crash the browser.

This behavior was confirmed with Mozilla/5.0 (Windows; U; Windows NT 5.1;
rv:1.7.3) Gecko/20040913 Firefox/0.10, but my guess is that all versions of
Mozilla introduce the problem.

Solution
Awaiting fix

Affected Products
Mozilla/5.0 Gecko/20040913 Firefox/0.10 and prior

----
Med venlig hilsen // Kind regards

Peter Kruse,
Security- and virusanalyst,
CSIS, Combined Services & Integrated Solutions
https://www.csis.dk

PGP fingerprint
79FD 0648 158E 6B9E 236F CFDA 7C58 64D6 BE83 FA60

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close