vendor:
Maxthon Browser
by:
Carlos Mario Penagos Hollmann
7.8
CVSS
HIGH
Denial of Service (DoS)
20
CWE
Product Name: Maxthon Browser
Affected Version From: v3.0.20.1000
Affected Version To: v3.0.20.1000
Patch Exists: YES
Related CWE: N/A
CPE: a:maxthon:maxthon_browser:3.0.20.1000
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3, Windows 7, Linux (VMware Fusion 3.1 and VirtualBox 3.2.8)
2011
Maxthon Browser v3.0.20.1000 .ref .replace DOS
This exploit is a Denial of Service (DoS) vulnerability in Maxthon Browser v3.0.20.1000. The vulnerability is caused due to a boundary error when handling the .ref and .replace functions, which can be exploited to cause a DoS condition. The exploit code uses the mul() function to generate a string of 2304453 'a' characters, which is then passed to the .ref and .replace functions. This causes the browser to crash.
Mitigation:
Upgrade to the latest version of Maxthon Browser.