This Metasploit module exploits a code execution vulnerability in the Mozilla Firefox browser. To reliably exploit this vulnerability, we need to fill almost a gigabyte of memory with our nop sled and payload. This module has been tested on OS X 10.3 with the stock Firefox 1.5.0 package.
68da1f78d3e93ac5d6c2f0d52c01784d5f629a3336fadd2e30ee6f133cbb252e
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface(). Max OS X version.
7c6bea30c17ae1b878021bf81a94043f8b3f1890987d1740121af33489ac7eb2
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface().
27403aaf40c5cf1757082c221602bd936a4ba0e10502192e6ae985fd103555ee
Several vulnerabilities exist in the Mozilla web browser and derived products, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system. Version of Mozilla Firefox below 1.5.0.1 and versions of SeaMonkey below 1.0 are affected.
0b913a4940b9c1df8bc0877a60ff3d579cb186e228c0c21ed540d188f86298b9