½Ã½ºÅÛ°ü¸®ÀÚÀÇ ½°ÅÍ Ä¿ÇǴнº Ä¿ÇÇÇâÀÌ ³ª´Â *NIX
Ä¿ÇǴнº
½Ã½ºÅÛ/³×Æ®¿÷/º¸¾ÈÀ» ´Ù·ç´Â °÷
 FAQFAQ   °Ë»ö°Ë»ö   ¸â¹ö¸®½ºÆ®¸â¹ö¸®½ºÆ®   »ç¿ëÀÚ ±×·ì»ç¿ëÀÚ ±×·ì   »ç¿ëÀÚ µî·ÏÇϱâ»ç¿ëÀÚ µî·ÏÇϱâ 
 °³ÀÎ Á¤º¸°³ÀÎ Á¤º¸   ºñ°ø°³ ¸Þ½ÃÁö¸¦ È®ÀÎÇÏ·Á¸é ·Î±×ÀÎÇϽʽÿÀºñ°ø°³ ¸Þ½ÃÁö¸¦ È®ÀÎÇÏ·Á¸é ·Î±×ÀÎÇϽʽÿÀ   ·Î±×Àηα×ÀΠ

°¡ÀÔ¾øÀÌ ´©±¸³ª ±ÛÀ» ¾µ ¼ö ÀÖ½À´Ï´Ù. °øÁö»çÇ׿¡ ´ëÇÑ ´ñ±Û±îÁöµµ..




BBS >> ¼³Ä¡, ¿î¿µ Q&A | ³×Æ®¿÷, º¸¾È Q&A | ÀÏ¹Ý Q&A || Á¤º¸¸¶´ç | AWS || ÀÚÀ¯°Ô½ÃÆÇ | ±¸Àα¸Á÷ || °øÁö»çÇ× | ÀǰßÁ¦½Ã
Firefox 1.0.7 IFRAME ¿À¹öÇ÷οì Ãë¾àÁ¡

 
±Û ¾²±â   ´äº¯ ´Þ±â    Ä¿ÇǴнº, ½Ã½ºÅÛ ¿£Áö´Ï¾îÀÇ ½°ÅÍ °Ô½ÃÆÇ À妽º -> *NIX / IT Á¤º¸
ÀÌÀü ÁÖÁ¦ º¸±â :: ´ÙÀ½ ÁÖÁ¦ º¸±â  
±Û¾´ÀÌ ¸Þ½ÃÁö
truefeel
Ä«Æä °ü¸®ÀÚ


°¡ÀÔ: 2003³â 7¿ù 24ÀÏ
¿Ã¸° ±Û: 1277
À§Ä¡: ´ëÇѹα¹

¿Ã¸®±â¿Ã·ÁÁü: 2005.10.10 ¿ù, 12:17 pm    ÁÖÁ¦: Firefox 1.0.7 IFRAME ¿À¹öÇ÷οì Ãë¾àÁ¡ Àοë°ú ÇÔ²² ´äº¯

¸®´ª½º¿¡¼­ http://www.security-protocols.com/sp-x19-poc.html ÆäÀÌÁö Á¢¼ÓÇÏ¸é ºê¶ó¿ìÀú°¡ Á×½À´Ï´Ù.
À©µµ¿ë¿¡¼­´Â ÀÌ·± ¹®Á¦°¡ ¾ø½À´Ï´Ù.

Ãâó : Security-Protocols
http://security-protocols.com/modules.php?name=News&file=article&sid=2978

Àοë:

Firefox 1.0.7 IFRAME Float Stack Overflow Bugs/Errors

A stack overflow vulnerability exists within Firefox 1.0.7 and all prior versions for Linux which causes the browser to crash, and or may allow for an attacker to execute arbitrary code on a targeted host. Please read more for the full advisory.


Firefox 1.0.7 IFRAME Float Stack Overflow

Release Date:
October 5, 2005

Date Reported:
August 8, 2005

Severity:
Medium

Vendor:
Mozilla Foundation

Versions Affected:
Firefox 1.0.7 for Linux

Overview:
A stack overflow vulnerability exists within Firefox 1.0.7 and all prior versions for
linux which may allow for an attacker to execute arbitrary code on a targeted host.

Technical Details:
The issue is when an IFRAME has the width of 33333333, this causes Firefox to crash.
The following code below will reproduce this issue:

IFRAME WIDTH=33333333

Vendor Status:
Mozilla is currently working on a patch.

Discovered by:
Tom Ferris

Related Links:
http://www.security-protocols.com/sp-x19-poc.html
http://www.security-protocols.com/advisory/sp-x19-advisory.txt
http://www.evolvesecurity.com

Copyright (c) 2005 Security-Protocols.com
À§·Î
»ç¿ëÀÚ Á¤º¸ º¸±â ºñ¹Ð ¸Þ½ÃÁö º¸³»±â ±Û ¿Ã¸°ÀÌÀÇ À¥»çÀÌÆ® ¹æ¹®
ÀÌÀü ±Û Ç¥½Ã:   
±Û ¾²±â   ´äº¯ ´Þ±â    Ä¿ÇǴнº, ½Ã½ºÅÛ ¿£Áö´Ï¾îÀÇ ½°ÅÍ °Ô½ÃÆÇ À妽º -> *NIX / IT Á¤º¸ ½Ã°£´ë: GMT + 9 ½Ã°£(Çѱ¹)
ÆäÀÌÁö 1 Áß 1

 
°Ç³Ê¶Ù±â:  
»õ·Î¿î ÁÖÁ¦¸¦ ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù
´ä±ÛÀ» ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù
ÁÖÁ¦¸¦ ¼öÁ¤ÇÒ ¼ö ¾ø½À´Ï´Ù
¿Ã¸° ±ÛÀ» »èÁ¦ÇÒ ¼ö ¾ø½À´Ï´Ù
ÅõÇ¥¸¦ ÇÒ ¼ö ¾ø½À´Ï´Ù


Powered by phpBB © 2001, 2005 phpBB Group