header-logo
Suggest Exploit
vendor:
Firefox Web Browser
by:
splices, spiffomatic64, Securident Technologies
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Firefox Web Browser
Affected Version From: 1.5.0.2
Affected Version To: 1.5.0.2
Patch Exists: NO
Related CWE: N/A
CPE: a:mozilla:firefox:1.5.0.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows
2006

Firefox Remote Code Execution and Denial of Service

A handling issue exists in how Firefox handles certain Javascript in js320.dll and xpcom_core.dll regarding iframe.contentWindow.focus(). By manipulating this feature a buffer overflow will occur.

Mitigation:

Vendor contacted, no patch yet.
Source

Exploit-DB raw data:

<!--
---------------------------------------------------
Software:  
 Firefox Web Browser
Tested: 
 Linux, Windows clients' version 1.5.0.2
Result:  
 Firefox Remote Code Execution and Denial of Service - Vendor contacted, no patch yet.
Problem:
 A handling issue exists in how Firefox handles certain Javascript in js320.dll and xpcom_core.dll
regarding iframe.contentWindow.focus().  By manipulating this feature a buffer overflow will occur.  
Proof of Concept:
 http://www.securident.com/vuln/ff.txt
Credits:
 splices(splices [dot] org)
 spiffomatic64(spiffomatic64 [dot] com)
 Securident Technologies (securident [dot] com)
------------------------------------------------ 

http://www.securident.com/vuln/ffdos.htm - PoC firefox dos
 
 Paste the below code snippet and view it in Firefox for DoS PoC or visit the link above. -->

<textarea cols="0" rows="0" id="x_OtherInfo" name="x_OtherInfo">