BugTraq
DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 18 2010 01:17PM
MustLive (mustlive websecurity com ua) (1 replies)
Re: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 18 2010 05:38PM
Susan Bradley (sbradcpa pacbell net) (1 replies)
Re: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 19 2010 10:53PM
MustLive (mustlive websecurity com ua) (1 replies)
Re: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 19 2010 11:58PM
Susan Bradley (sbradcpa pacbell net) (1 replies)
Re: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 27 2010 08:53PM
MustLive (mustlive websecurity com ua) (1 replies)
Re: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 28 2010 03:07PM
John Smith (at-x live com) (1 replies)
Re[2]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 28 2010 06:17PM
Vladimir '3APA3A' Dubrovin (3APA3A SECURITY NNOV RU) (1 replies)
Re: Re[2]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 28 2010 07:55PM
John Smith (at-x live com) (2 replies)
Point taken. But that'd be a non-issue on the browser's end as much as
site's that is allowing the rogue scripts (or malformed ads, as per your
example).
The fork of this mail thread clearly explains what I'm talking about. The
issue noted there is a simple DoS attack which every programming language
and platform is vulnerable too. Its called the "infinite loop". It is not a
'security vulnerability' by itself and is completely agnostic of the uri
handler (try http or anything instead of nntp).

Here's the simplified JS version of it (lets call it the Universal DoS --
yes, it'd work for every browser on the planet that can execute JS) -

<script>
while(1)alert('hello world');
</script>

Done!

Workaround:
None very intuitive. Maybe allow the user to terminate the script at every
iteration? specific time period? etc...

--------------------------------------------------
From: "Vladimir '3APA3A' Dubrovin" <3APA3A (at) SECURITY.NNOV (dot) RU [email concealed]>
Sent: Friday, May 28, 2010 11:47 PM
To: "John Smith" <at-x (at) live (dot) com [email concealed]>
Cc: "MustLive" <mustlive (at) websecurity.com (dot) ua [email concealed]>; "Susan Bradley"
<sbradcpa (at) pacbell (dot) net [email concealed]>; <bugtraq (at) securityfocus (dot) com [email concealed]>
Subject: Re[2]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome,
Opera and other browsers

> Dear John Smith,
>
> Actually, browser DoS may be quite serious vulnerability, depending on
> nature of DoS. Think about e.g. banner or content exchange network,
> social networks, web boards, etc where browser vulnerability may be
> used against site or page because it will harm any visitors of this
> site or page.
>
> In case of this very vulnerability, most serious impact may be from
> e-mail vector.
>
> --Friday, May 28, 2010, 7:07:50 PM, you wrote to
> mustlive (at) websecurity.com (dot) ua [email concealed]:
>
> JS> Just a few cents - DoS in webbrowsers doesn't fall under the category
> of
> JS> "vulnerabilities" rather more of "annoyances". Although I don't deny
> the
> JS> fact that certain DoS attacks *may lead* or *may serve as hints* to
> other
> JS> more serious exploits, but that's a different topic and with ASLR in
> the
> JS> scene, a very grey area of discussion.
>
>
>
> --
> Skype: Vladimir.Dubrovin
> ~/ZARAZA http://securityvulns.com/
> Ñòðåëÿÿ âî âòîðîé ðàç, îí èñêàëå÷èë ïîñòîðîííåãî. Ïîñòîðîííèì áûë ÿ.
> (Òâåí)
>
>

[ reply ]
Re[3]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers Jun 03 2010 08:12PM
MustLive (mustlive websecurity com ua)
Re[4]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers May 28 2010 08:35PM
Vladimir '3APA3A' Dubrovin (3APA3A SECURITY NNOV RU) (1 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus