BugTraq
RE: Firescrolling [Firefox 1.0] Feb 25 2005 05:36PM
Eric McCarty (eric piteduncan com)
Confirmed Exploit works in Firefox 1.0, however on a side note Microsoft
Anti-spyware prevented the script from executing.

Eric McCarty
Systems Administrator
Internet Security Officer

-----Original Message-----
From: mikx [mailto:mikx (at) mikx (dot) de [email concealed]]
Sent: Friday, February 25, 2005 12:11 AM
To: full-disclosure (at) lists.netsys (dot) com [email concealed]; bugtraq (at) securityfocus (dot) com [email concealed];
NTBUGTRAQ (at) LISTSERV.NTBUGTRAQ (dot) COM [email concealed]
Subject: Firescrolling [Firefox 1.0]

__Summary

Remember my Internet Explorer "scrollbar exploit" based on http-equiv's
"What a Drag"? When will people ever learn that "unusual user
interaction"
can be hidden by common tasks...

Let's combine fireflashing, firetabbing, xul and javascript to run
arbitrary code by dragging a scrollbar two times.

__Proof-of-Concept

http://www.mikx.de/firescrolling/

__Status

The exploit is based on multiple vulnerabilities:

bugzilla.mozilla.org #280664 (fireflashing) bugzilla.mozilla.org #280056
(firetabbing) bugzilla.mozilla.org #281807 (firescrolling)

Upgrade to Firefox 1.0.1 or disable javascript.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0527 to this issue.

__Affected Software

Tested with Firefox 1.0 on Windows and Linux (Fedora Core)

__Contact Informations

Michael Krax <mikx (at) mikx (dot) de [email concealed]>
http://www.mikx.de/?p=11

mikx

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus