-Dan Veditz Mozilla security group member wrote :

>The exploit example you give is not remote command execution but rather a
>violation of the same origin policy.

First off, the example bug I demonstrated:

http://meme-boi.netfirms.com/werd.html

while true it doesn't show remote class loading , is not fixed in 1.4.

I haven't tested 1.3 but I assure you there are serious issues , and the
bug is different , but I'll let you figure that out.


-Dan Veditz  wrote :

>Unless there are additional details you are withholding this same flaw
>was >reported on Bugtraq April 15



Here is some select gdb output from an attached session while
viewing, and executing specially crafted *priva8* ( meaning no soup for you)
meme156 code from remote server:

<snip>

[New Thread 1106058544 (LWP 15390)]
[New Thread 1122508080 (LWP 15391)]
[New Thread 1131003184 (LWP 15392)]
[New Thread 1139535152 (LWP 15393)]
[New Thread 1147927856 (LWP 15394)]
[New Thread 1156320560 (LWP 15395)]
[Thread 1156320560 (LWP 15395) exited]
[Thread 1139535152 (LWP 15393) exited]

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 1077855392 (LWP 15388)]
0x4003b9dd in JS_CompileUCFunctionForPrincipals () from /usr/lib/libmozjs.so


(gdb) backtrace
#0  0x4003b9dd in JS_CompileUCFunctionForPrincipals ()
   from /usr/lib/libmozjs.so
#1  0x424bf3d6 in NSGetModule () from
/usr/local/mozilla/components/libjsdom.so#2  0x40d2b203 in NSGetModule ()
   from /usr/local/mozilla/components/libgklayout.so
#3  0x40b52252 in NSGetModule ()
   from /usr/local/mozilla/components/libgklayout.so
#4  0x40b52525 in NSGetModule ()


//noop begins here on Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4)

0xbfffe644:     0x00001000      0x00000011      0x00000064      0x00000003
0xbfffe654:     0x08048034      0x00000004      0x00000020      0x00000005
0xbfffe664:     0x00000006      0x00000007      0x40000000      0x00000008
---Type <return> to continue, or q <return> to quit---
0xbfffe674:     0x00000000      0x00000009      0x08056e20      0x0000000b
0xbfffe684:     0x000001f4      0x0000000c      0x000001f4      0x0000000d
0xbfffe694:     0x00000000      0x0000000e      0x00000000      0x0000000f
0xbfffe6a4:     0xbffffbb4      0x00000000      0x00000000      0x00000000
0xbfffe6b4:     0x00000000      0x00000000      0x00000000      0x00000000
0xbfffe6c4:     0x00000000      0x00000000      0x00000000      0x00000000
0xbfffe6d4:     0x00000000      0x00000000      0x00000000      0x00000000
0xbfffe6e4:     0x00000000      0x00000000      0x00000000      0x00000000

</snip>

For authentication purposes and further proof of concept that someone(s)
dropped the ball and opened up old and new cans of worms I provide silly
denial of service code that should work on mo , opera and netscape:
http://meme-boi.netfirms.com/modos.html

( this won't work on 2.1.4 based browsers )


-Dan Veditz wrote :

>If instead you'd like to give the whitehats time to fix them details would
>be gratefully received by "security" at "mozilla.org"


I thank you for the invitation , but I am a wal-mart janitor and I don't
have much time for finding bugs so I am saving more interesting methods of
bug harnessing for stalking clearchannel communications employees and
making them pay for forcing the world to listen to justin timberlake.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to