Tuesday, September 27, 2005

[NEWS] Gecko Based Browsers Proxy Auto-Config Script DoS

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -

Gecko Based Browsers Proxy Auto-Config Script DoS
------------------------------------------------------------------------

SUMMARY

Improper variable checking can cause Gecko based browsers to crash when
handling PAC scripts.

DETAILS

Vulnerable Systems:
* Netscape Browser version 8.0.3.3
* Mozilla Firefox version 1.0.6

Immune Systems:
* Mozilla Firefox version 1.0.7

When handling a PAC file Gecko based browsers do not validate variables
properly. PAC files that contain a NULL character will cause the browser
to crash.

Patch:
Index: mozilla/js/src/jsobj.c
-==================================================================
RCS file: /cvsroot/mozilla/js/src/jsobj.c,v
retrieving revision 3.204
diff -u -r3.204 mozilla/js/src/jsobj.c
--- mozilla/js/src/jsobj.c
+++ mozilla/js/src/jsobj.c
@@ -1128,7 +1128,8 @@
rt = cx->runtime;
if (rt->findObjectPrincipals) {
scopePrincipals = rt->findObjectPrincipals(cx, scopeobj);
- if (!principals->subsume(principals, scopePrincipals)) {
+ if (scopePrincipals &&
+ !principals->subsume(principals, scopePrincipals)) {
JS_ReportErrorNumber(cx, js_GetErrorMessage, NULL,
JSMSG_BAD_INDIRECT_CALL, js_eval_str);
return JS_FALSE;
Index: mozilla/js/src/jsscript.c
-==================================================================
RCS file: /cvsroot/mozilla/js/src/jsscript.c,v
retrieving revision 3.78
diff -u -r3.78 mozilla/js/src/jsscript.c
--- mozilla/js/src/jsscript.c
+++ mozilla/js/src/jsscript.c
@@ -306,7 +306,8 @@
rt = cx->runtime;
if (rt->findObjectPrincipals) {
scopePrincipals = rt->findObjectPrincipals(cx, scopeobj);
- if (!principals->subsume(principals, scopePrincipals)) {
+ if (scopePrincipals &&
+ !principals->subsume(principals, scopePrincipals)) {
JS_ReportErrorNumber(cx, js_GetErrorMessage, NULL,
JSMSG_BAD_INDIRECT_CALL,
"Script.prototype.exec");

ADDITIONAL INFORMATION

The information has been provided by <mailto:juha-matti.laurio@netti.fi>
Juha-Matti Laurio.
The vendor bug report can be found at:
<https://bugzilla.mozilla.org/show_bug.cgi?id=302100>
https://bugzilla.mozilla.org/show_bug.cgi?id=302100

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments:

Post a Comment