skip to main | skip to sidebar
Where facts are few, experts are many
  • Home
  • Menu
    • About Me
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
  • Contact
    • Mail
  • Subscribe to Feed
Advisories - Firefox DoS (unclamped loop)
| 0 comments ]

  • [TZO-26-2009] Firefox DoS (unclamped loop) forced disclosure



0 comments

Post a Comment

Newer Post Older Post Home

About Me

My photo
Thierry Zoller
Welcome to my blog covering Information Security and Privacy.



Former Amazon, HSBC, Verizon - Alumnus

Quick-links
▪ About me
▪ Tools / Talks / Whitepapers
▪ Vulnerability disclosure policy
▪ Subsribe to RSS Feed

View my complete profile

  • Follow me on Twitter
  • Follow me on Linked-in

  • The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.

    Total Pageviews

    Blog Archive

    • ►  2020 (14)
      • ►  October (1)
      • ►  August (1)
      • ►  July (5)
      • ►  May (2)
      • ►  April (2)
      • ►  March (1)
      • ►  January (2)
    • ►  2017 (1)
      • ►  October (1)
    • ►  2013 (4)
      • ►  July (1)
      • ►  June (1)
      • ►  March (2)
    • ►  2012 (11)
      • ►  November (1)
      • ►  August (2)
      • ►  July (1)
      • ►  June (4)
      • ►  May (2)
      • ►  March (1)
    • ►  2011 (10)
      • ►  December (3)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
    • ►  2010 (6)
      • ►  August (1)
      • ►  July (1)
      • ►  March (2)
      • ►  February (2)
    • ▼  2009 (80)
      • ►  November (2)
      • ►  October (1)
      • ►  September (3)
      • ►  July (3)
      • ►  June (2)
      • ▼  May (22)
        • Correlated list of advisories
        • Advisory - Firefox Denial of service (Keygen)
        • About the different risk ratings of Anti-virus byp...
        • Advisories - Firefox DoS (unclamped loop)
        • IIS 5 / IIS 5.1 / IIS 6 Webdav unicode - the bug t...
        • RSA and DSA - misconceptions and usefull information
        • Advisories : Panda multiple evasions
        • Advisories - Avira, Bitdefender generic PDF evasion
        • Advisory: Clamav generic evasion (CAB)
        • Advisory : F-Prot - Generic evasion (RAR,ARJ,LHA)
        • Advisory - Clamav generic bypass (RAR,CAB,ZIP)
        • F-prot generic evasion (TAR)
        • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
        • Advisory : Apple Safari remote code execution
        • Advisory: Apple Safari & Quicktime DoS
        • Advisory : Frisk F-prot evasion (TAR)
        • Advisory : Norman generic evasion (RAR)
        • Advisory - Ikarus multiple generic evasions
        • The myth of the untrusted Insider, the 80% lie - b...
        • 100th post : What about the big guys (Symantec,IBM...
        • Advisory : Kaspersky generic PDF evasion
        • Advisories : AVG, F-prot, Trendmicro(update)
      • ►  April (16)
      • ►  March (17)
      • ►  February (7)
      • ►  January (7)
    • ►  2008 (31)
      • ►  December (2)
      • ►  November (7)
      • ►  October (7)
      • ►  September (3)
      • ►  August (12)
    • ►  2007 (7)
      • ►  October (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2006 (6)
      • ►  December (1)
      • ►  August (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2005 (9)
      • ►  October (1)
      • ►  April (7)
      • ►  January (1)
    • ►  2000 (1)
      • ►  March (1)

    Featured Post

    A Primer on dealing with the DPA of Luxembourg - the CNPD

    This blog post will be updated periodically as I come across new practical information and experiences. You can subscribe to my blog if you ...

    Be notified for new posts

    Popular Posts

    • How to effectively evade the GDPR and the reach of the DPA (CDPWE-0001) (PART 1)
      How to effectively evade the GDPR and the reach of the DPA (PART 1) This is a post in a series of posts : How to deal with the DPA of Luxem...
    • How Germany re-introduced border controls to Luxembourg
      Introduction As many of you know the Schengen Agreement (Named after the Luxemburg City "Schengen" where the initial contract was...
    • Advisories 2020
      This is a living post, that will be updated as I release Advisories. Updates: 02.01.2020 - Added Initial List of Advisories 09.01.2...
    • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
      Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...
    • SSL Audit v.08 released
      I have updated my little TLS/SSL Scanner called "SSL Audit" to version 0.8. I tweaked it slightly but the tool is still based o...

    Blogs I read

    • Krebs on Security
      How $100M in Jobless Claims Went to Inmates - The U.S. Labor Department's inspector general said this week that roughly $100 million in fraudulent unemployment insurance claims were paid in 2020 to cri...
      14 hours ago
    • Schneier on Security
      On Chinese-Owned Technology Platforms - I am a co-author on a report published by the Hoover Institution: “Chinese Technology Platforms Operating in the United States.” From a blog post: The re...
      1 day ago
    • Privacy Law Blog
      The Future of the FTC: Part I - Ryan Blaney and Brooke Gottlieb On January 21, 2021, President Biden designated Federal Trade Commission (the “FTC”) Commissioner Rebecca Kelly Slaughter...
      1 day ago
    • Adam Shostack & friends
      Linkedin Learning - I am very excited to announce that Linkedin Learning has released “Threat Modeling: Denial of Service and Elevation of Privilege.” This is the sixth course...
      2 days ago
    • Securosis Highlights
      Infrastructure Hygiene: Why It’s Critical for Protection - Posted under: Research and Analysis After many decades as security professionals, it is depressing to have the same issues repeatedly. It’s kind of like w...
      3 days ago
    • Didier Stevens
      re-search.py And Custom Validations - My tool re-search.py is a tool that uses regular expressions to search through files. You can use regular expressions from a small builtin library, or prov...
      4 days ago
    • Troy Hunt
      Weekly Update 231 - I seem to have spread myself across a whole heap of different things this week which is fine (it's all stuff I love doing), but it has made for rather a ...
      1 week ago
    • TaoSecurity
      Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - *Proposition* Digital offense capabilities are currently net negative for the security ecosystem.[0] The costs of improved digital offense currently ou...
      1 week ago
    • Uncommon Sense Security
      Finally, the results of the employer support survey - Delayed by holidays and the madness of the past month, but here it is. First, the very short summary: most of us in the security realm are pretty lucky t...
      4 weeks ago
    • CrySyS Blog
      Driver fingerprinting - When your driving style is as unique as your signature Perhaps it doesn’t come as a surprise that we all have unique driving styles. My father is a calm, s...
      1 month ago
    • Lenny Zeltser on Information Security
      How You Can Start Learning Malware Analysis - Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering...
      1 month ago
    • Security
      The cleverest floppy disc protection ever? Western Security Ltd. - Introduction I've been on a bit of a floppy disc protection odyssey recently. This will probably be the last floppy disc related post for some time, so how...
      2 months ago
    • contagio
      2020-12-13 SUNBURST SolarWinds Backdoor samples - *Reference* I am sure you all saw the news. 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Glo...
      2 months ago
    • A Few Thoughts on Cryptographic Engineering
      Ok Google: please publish your DKIM secret keys - The Internet is a dangerous place in the best of times. Sometimes Internet engineers find ways to mitigate the worst of these threats, and sometimes they f...
      3 months ago
    • Carnal0wnage & Attack Research Blog
      WeirdAAL update - get EC2 snapshots - I watched a good DEF CON video on abusing public AWS Snapshots https://www.youtube.com/watch?v=-LGR63yCTts I, of course, wanted to check this out. There a...
      9 months ago
    • Chatter on the Wire: How excessive network traffic gives away too much!
      Youtube channel - I've continued to make updates to the python version of satori and have put a lot of time in the past few weeks to updating fingerprints and fixing some mi...
      2 years ago
    • GreyHatHacker.NET
      Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google ...
      2 years ago
    • /dev/ttyS0
      Protected: TP-Link is Bullshit - There is no excerpt because this is a protected post.
      2 years ago
    • newsoft's fun blog
      SSTIC 2018 - Nous sommes en 2018. Fuites de données, attaques massives, failles structurelles, le monde constate chaque jour un peu plus à quel point la sécurité est ...
      2 years ago
    • root labs rdist
      In Which You Get a Chance to Save Democracy - Let’s start with the end: you can do something to change the broken political landscape in the United States, but you have to act quickly. Here’s a link to...
      3 years ago
    • Arne Swinnen's Security Blog - Just Another Infosec Blog
      Authentication bypass on Uber’s Single Sign-On via subdomain takeover - TL;DR: Uber was vulnerable to subdomain takeover on saostatic.uber.com via Amazon CloudFront CDN. Moreover, Uber’s recently deployed Single Sign-On (SSO) s...
      3 years ago
    • VRT
      Player 3 Has Entered the Game: Say Hello to 'WannaCry' - *This post was authored by Martin Lee, Warren Mercer, Paul Rascagneres, and Craig Williams.* Executive SummaryA major ransomware attack has affected many o...
      3 years ago
    • Claude Adam
      En français svp? - Mir stelle fest, datt graff vereinfacht, zu Lëtzebuerg 100.000 Lëtzebuerger schaffen, 100.000 net-Lëtzebuerger Residenten an 200.000 Frontalieren. Datt ënn...
      3 years ago
    • LuxLegal
      La réforme des allocations familiales : une nouvelle atteinte aux droits des familles recomposées ? - Alors que la Cour de Justice de l’Union Européenne est toujours saisie de litiges concernant des enfants étudiants issus de familles recomposées s’étant vu...
      4 years ago
    • Secure Belief
      VulnHub Stapler 1 Solution 2 - You can find Solution 1 here. After spending a night on this, I finally managed to solve the 2nd way to get limited shell on this box. Let's see how this ...
      4 years ago
    • Fun Over IP
      McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
      5 years ago
    • Cup of Security
      Tips That Will Help You Become An Intelligent Investor - Have you considered any investing strategies? If you don't, know you are not the only one. Lots of people have limited knowledge regarding investments. Her...
      5 years ago
    • Scrammed!
      A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
      6 years ago
    • mossmann's blog
      Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
      6 years ago
    • Java security and related topics
      USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
      6 years ago
    • The iSecLab Blog [by Faculty and Students];
      New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
      6 years ago
    • Amrit Williams Blog
      RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
      6 years ago
    • ax330d's blog
      Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
      6 years ago
    • Cognitive Dissidents
      Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
      7 years ago
    • Ma petite parcelle d'Internet...
      Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
      7 years ago
    • Androguard
      One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
      7 years ago
    • Digital Forensics is a Science
      Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
      8 years ago
    • Nynaeve
      NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
      10 years ago
    • IBM Internet Security Systems Frequency X Blog
      -
    • CryptoLUX - Recent changes [en]
      -
    • rmhrisk.wpengine.com/
      -
    • Metasploit
      -
    • woanware
      -
    • ...And You Will Know me by the Trail of Bits
      -
    Show 10 Show All

    Links

    • Schneier on Security
    • Brian Krebs on Security
    • Lenny Zeltser
    • Malware LU
    • CryptoLux
    • Unmitigated Risk
    • TaoSecurity - Bejtlich
    • root labs rdist
    • Securosis Blog
    • Trail of Bits
    • Sid's Blog [FR]
    • Fun over IP
    • Hack.lu
    • Joe Sandbox
    • SVEN

    Labels

    • Advisory (53)
    • Rants from Thierry (26)
    • Tool (19)
    • Vulnerabilties (13)
    • Misc (11)
    • Interesting Reads (10)
    • 0day (7)
    • How-to (7)
    • Luxembourg (6)
    • Whitepaper (4)
    • Constitution (2)
    • Hardware hacking (2)
    • Data Privacy (1)
     
    Copyright Musings on Information Security and Data Privacy