Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#15505 - [firefox] Heap Spray Vulnerabilty
Attached to Project:
Arch Linux
Opened by Roman Kyrylych (Romashka) - Tuesday, 14 July 2009, 14:30 GMT
Last edited by Jan de Groot (JGC) - Saturday, 18 July 2009, 13:24 GMT
Opened by Roman Kyrylych (Romashka) - Tuesday, 14 July 2009, 14:30 GMT
Last edited by Jan de Groot (JGC) - Saturday, 18 July 2009, 13:24 GMT
|
DetailsDescription:
There is an exploit for Mozilla Firefox 3.5 heap spray vulnerability: http://www.milw0rm.com/exploits/9137 From comments on some sites it looks like 3.0.11 is affected too. It is also said that both DoS and arbitrary code execution is possible. No patch to plug the hole is known to exist at this moment. |
This task depends upon
Closed by Jan de Groot (JGC)
Saturday, 18 July 2009, 13:24 GMT
Reason for closing: Fixed
Additional comments about closing: 3.5.1-1 is in the repositories now.
Saturday, 18 July 2009, 13:24 GMT
Reason for closing: Fixed
Additional comments about closing: 3.5.1-1 is in the repositories now.
1) the exploit in the wild is suited for 32bit Windows (LOL, didn't noticed that)
2) though it does work on Linux system it does not lead to arbitrary code execution (because of reason above),
the usual effect is just a hang (up to one minute long) of loading the page with exploit
Still the vulnerability can be exploited to arbitrary code execution on Linux (requires writing a specific payload),
so it's better to apply a fix as soon as it arrives.
I guess that patch will be reported here when it'll be done: http://secunia.com/advisories/35798/