On 5/30/18, EE <nu...@bees.wax> wrote:
> Lee wrote:
>> On 5/29/18, Frank-Rainer Grahl wrote:
>>> Seems to be a "feature" of Sophos to report possible ROP problems in any
>>> software. Use latest compatible Noscript and uBlock and just add an
>>> exception in Sophos.
>>
>> If one wanted to check and see if maybe the possible ROP problem
>> really was the result of executing a piece of malicious code from a
>> web site, how would you go about it?
>>
>> I tried this:
>> C:\Temp>type startSM-with-logging.bat
>> @REM see
>> https://developer.mozilla.org/en-US/docs/Mozilla/Debugging/HTTP_logging
>> @REM
>>
>> @rem set
>> MOZ_LOG=timestamp,sync,rotate:200,nsHttp:5,cache2:5,nsSocketTransport:5,nsHostResolver:5
>>
>> set MOZ_LOG=timestamp,sync,rotate:200,nsHttp:3
>> @rem nsHttp:3   log only http request and response headers
>>
>> set MOZ_LOG_FILE=%TEMP%\sm-log.txt
>>
>> "c:\Program Files (x86)\SeaMonkey\SeaMonkey.exe"
>>
>>
>> which is 1) more verbose than I'd like and 2) not so easy to parse.
>> Is there some other way to keep track of what all SeaMonkey gets off the
>> web?
>>
>> Thanks
>> Lee
>>
>>
>>> Dirk Munk wrote:
>>>> Dirk Munk wrote:
>>>>> I have Sophos anti-virus (etc.) running on my PC, and a few days ago
>>>>> it
>>>>> reported a ROP problem with Seamonkey and closed it down.
>>>>>
>>>>> After restarting Seamonkey everything was fine again.
>>>>>
>>>>> Sophos gave this trace of the problem:
>>>>>
>>>>> Mitigation   ROP
>>>>>
>>>>> Platform     10.0.17134/x64 v614 06_3a
>>>>> PID          18136
>>>>> Application  C:\Program Files\SeaMonkey\seamonkey.exe
>>>>> Description  SeaMonkey 2.49.3
>>>>>
>>>>> Callee Type  LoadLibrary
>>>>>
>>>>> Stack Trace
>>>>> #  Address          Module                   Location
>>>>> -- ---------------- ------------------------
>>>>> ----------------------------------------
>>>>> 1  00007FFD8A0FBC4D KernelBase.dll
>>>>> 2  00007FFD8D6927D7 ntdll.dll
>>>>> 3  00007FFD8D67AC26 ntdll.dll                __C_specific_handler
>>>>> +0x96
>>>>> 4  00007FFD8D68EDCD ntdll.dll                __chkstk +0x11d
>>>>> 5  00007FFD8D5F6C86 ntdll.dll
>>>>> 6  00007FFD8D68DCFE ntdll.dll KiUserExceptionDispatcher +0x2e
>>>>>
>>>>> 7  00007FFD3CFAF0FD xul.dll
>>>>>                      80791000                 CMP          BYTE
>>>>> [RCX+0x10], 0x0
>>>>>                      7465                     JZ 0x7ffd3cfaf168
>>>>>                      83b91c2b000000           CMP          DWORD
>>>>> [RCX+0x2b1c], 0x0
>>>>>                      7416                     JZ 0x7ffd3cfaf122
>>>>>                      498bc0                   MOV          RAX, R8
>>>>>                      482500f0ffff             AND          RAX,
>>>>> 0xfffffffffffff000
>>>>>                      488b4008                 MOV          RAX,
>>>>> [RAX+0x8]
>>>>>                      83b87008000000           CMP          DWORD
>>>>> [RAX+0x870],
>>>>> 0x0
>>>>>                      7446                     JZ 0x7ffd3cfaf168
>>>>>                      4d85c0                   TEST         R8, R8
>>>>>                      740c                     JZ 0x7ffd3cfaf133
>>>>>                      4881cae8ff0f00           OR           RDX,
>>>>> 0xfffe8
>>>>>                      833a01                   CMP          DWORD
>>>>> [RDX],
>>>>> 0x1
>>>>>                      7435                     JZ 0x7ffd3cfaf168
>>>>>                      498bc0                   MOV          RAX, R8
>>>>>                      4981e0a0c0ffff           AND          R8,
>>>>> 0xffffffffffffc0a0
>>>>>
>>>>> 8  00007FFD3A505F69 xul.dll
>>>>> 9  00007FFD3A50611B xul.dll
>>>>> 10 00007FFD3CFF9A07 xul.dll
>>>>>
>>>>> Process Trace
>>>>> 1  C:\Program Files\SeaMonkey\seamonkey.exe [18136]
>>>>> 2  C:\Windows\explorer.exe [11128]
>>>>> 3  C:\Windows\System32\userinit.exe [10980]
>>>>> 4  C:\Windows\System32\winlogon.exe [812]
>>>>> winlogon.exe
>>>>>
>>>>> Thumbprint
>>>>> 6b7c6ddb5008f8cfec2b72d6c65841972bb2c3f0f227ed14ea6b1187aec1429d
>>>>>
>>>>>
>>>> This is a security problem. According to Sophos, Seamonkey is doing
>>>> something
>>>> it should not be doing, perhaps executing a piece of malicious code from
>>>> a web site?
>>>>
>>>> I've seen the problem more often now, and I wonder if someone can have
>>>> a look at it?
>>>
> What is ROP?  I found 4 possible expansions for that abbreviation.

In the context of an anti-virus msg, most probably
> Return-oriented Programming

see
  
https://www.coursera.org/learn/software-security/lecture/vjGZA/return-oriented-programming-rop
which gets abut half way thru & prompts you to sign up :(  But it's
enough for you to get the idea

Lee
_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to