|
@RandomDhiraj | |||||
|
Fuzzing HTTP server, A format string vulnerability was found in Mozilla PDF.js
inputzero.io/2019/01/fuzzin…
#infosec #fuzzing
|
||||||
|
||||||
|
Dhiraj
@RandomDhiraj
|
21. sij 2019. |
|
I crossed check again and also informed Mozilla about this. "The development server used in PDF.js gets crash when a malformed URI(bad request) is sent."
Thank you all, for your suggestions and cross checking this.
|
||
|
|
||
|
ϻг_ϻε
@steventseeley
|
21. sij 2019. |
|
Yeah I’m not sure that’s a format string bug buddy.
|
||
|
|
||
|
Dhiraj
@RandomDhiraj
|
21. sij 2019. |
|
This issue was observed in PDF.js URI when we run gulp server which depends on multiple npm modules.
However when this was patch by Mozilla it was mention as format string vulnerability over there 😅
|
||
|
|
||
|
Rev
@RevToJa
|
21. sij 2019. |
|
Is it though? Was there any illegal memory access through an incorrect pointer dereference?
|
||
|
|
||
|
Dhiraj
@RandomDhiraj
|
21. sij 2019. |
|
As far I debug it, I haven't found any incorrect or null ptr in this case.
|
||
|
|
||
|
CodeColorist
@CodeColorist
|
21. sij 2019. |
|
Did you really understand what format string vuln is? It is just an unhandled malformed URI exception
|
||
|
|
||