The recent release of Firefox 32 fixes another interesting image parsing issue found by american fuzzy lop: following a refactoring of memory management code, the past few versions of the browser ended up using uninitialized memory for certain types of truncated images, which is easily measurable with a simple <canvas> + toDataURL() harness that examines all the fuzzer-generated test cases.
In general, problems like that may leak secrets across web origins, or more prosaically, may help attackers bypass security measures such as ASLR. For a slightly more detailed discussion, check out this post.
Here's a short proof-of-concept that should work if you haven't updated to 32 yet:
This is tracked as CVE-2014-1564, Mozilla bug 1045977. Several more should be coming soon.
CVE-2014-1564: Uninitialized memory with truncated images in Firefox
tháng 9 02, 2014 / with No comments /
Related Posts:
Yes, you can have fun with downloadsIt is an important and little-known property of web browsers that one document can always navigate other, non-same-origin windows to arbitrary URLs; i… Read More
Feynman on the Scientific MethodA colleague of mine recently pointed me to this fantastic lecture by Richard Feynman (1918-1988) explaining his take on the scientific method.Wha… Read More
Tax policy shocks and the business cycleI have to admit that I never ascribed much importance to the idea of "tax policy shocks" as an important driver of the U.S. postwar business cycle. I … Read More
Yrkesveiledning for aksjeroboterHøyesterett avgjorde med knappest mulig flertall at to daytradere som manipulerte Timber Hills aksjerobot frifinnes. Det var nære på at roboter fikk e… Read More
Plunging YieldsThe nominal yields on "high-grade" government debt instruments continue to plunge; see here. Real interest rates on U.S. government debt are nega… Read More
0 nhận xét:
Đăng nhận xét