The recent release of Firefox 32 fixes another interesting image parsing issue found by american fuzzy lop: following a refactoring of memory management code, the past few versions of the browser ended up using uninitialized memory for certain types of truncated images, which is easily measurable with a simple <canvas> + toDataURL() harness that examines all the fuzzer-generated test cases.
In general, problems like that may leak secrets across web origins, or more prosaically, may help attackers bypass security measures such as ASLR. For a slightly more detailed discussion, check out this post.
Here's a short proof-of-concept that should work if you haven't updated to 32 yet:
This is tracked as CVE-2014-1564, Mozilla bug 1045977. Several more should be coming soon.
CVE-2014-1564: Uninitialized memory with truncated images in Firefox
tháng 9 02, 2014 / with No comments /
Related Posts:
Ensidig riktigLærebøkene gir med god grunn bare én måte å beregne verdiskapning. Så når Rajee Sivam og Terje Strøm ved NyAnalyse i DN 8. oktober mener at min argume… Read More
FantasiskapningEt konsulentselskap lager fantasianslag på verdiskapningen til vindkraft for å få det til å se fornuftig ut. Olje- og energidepartementet har tvunget… Read More
Smart Contracts and Asset Tokenization Book of Smart Contracts 1959In his 1959 classic Theory of Value, Gerard Debreu takes a deep dive into general (Walrasian) equilibrium theory. (Yes, I … Read More
Are Negative Interest Rates Expansionary? A Review of Eggertsson et al. (2017)My answer is yes they are.I recently assigned my students to write a referee report of Eggertsson et al., "Are Negative Nominal Rates Expansionary?" I… Read More
What is the yield curve forecasting? It's well-known that in the United States, recessions are often preceded by an inversion of the yield curve. Is there any economic rationale for why t… Read More
0 nhận xét:
Đăng nhận xét