[Webkit-unassigned] [Bug 14021] New: WebKit race condition vulnerability
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Wed Jun 6 19:39:25 PDT 2007
http://bugs.webkit.org/show_bug.cgi?id=14021
Summary: WebKit race condition vulnerability
Product: WebKit
Version: 522+ (nightly)
Platform: Macintosh
URL: http://geekable.com/vulnerable.png
OS/Version: Mac OS X 10.4
Status: UNCONFIRMED
Severity: Critical
Priority: P1
Component: WebCore JavaScript
AssignedTo: webkit-unassigned at lists.webkit.org
ReportedBy: jeffcz at gmail.com
I'll quote Michal Zalewski, who discovered the vulnerability
(http://seclists.org/fulldisclosure/2007/Jun/0026.html):
When Javascript code instructs [the browser] to navigate away from a page
that meets same-domain origin policy (and hence can be scriptually
accessed and modified by the attacker) to an unrelated third-party
site, there is a window of opportunity for concurrently executed
Javascript to perform actions with the permissions for the old page,
but actual content for the newly loaded page, for example:
- Read or set victim.document.cookie,
- Arbitrarily alter document DOM, including changing form submission
URLs, injecting code,
- Read or write DOM structures that were not fully initialized,
prompting memory corruption and browser crash.
Proof of concept located at http://lcamtuf.coredump.cx/ierace/
Confirmed vulnerable on fully-patched Tiger installation with nightly WebKit
build r22026.
--
Configure bugmail: http://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the webkit-unassigned
mailing list