Twitter | Pretraživanje | |
Dhiraj
Fuzzing HTTP server, A format string vulnerability was found in Mozilla PDF.js
Reply Retweet Označi sa "sviđa mi se" More
Dhiraj 21. sij 2019.
Odgovor korisniku/ci @RandomDhiraj
I crossed check again and also informed Mozilla about this. "The development server used in PDF.js gets crash when a malformed URI(bad request) is sent." Thank you all, for your suggestions and cross checking this.
Reply Retweet Označi sa "sviđa mi se"
ϻг_ϻε 21. sij 2019.
Odgovor korisniku/ci @mishradhiraj_
Yeah I’m not sure that’s a format string bug buddy.
Reply Retweet Označi sa "sviđa mi se"
Dhiraj 21. sij 2019.
Odgovor korisniku/ci @steventseeley
This issue was observed in PDF.js URI when we run gulp server which depends on multiple npm modules. However when this was patch by Mozilla it was mention as format string vulnerability over there 😅
Reply Retweet Označi sa "sviđa mi se"
Rev 21. sij 2019.
Odgovor korisniku/ci @mishradhiraj_
Is it though? Was there any illegal memory access through an incorrect pointer dereference?
Reply Retweet Označi sa "sviđa mi se"
Dhiraj 21. sij 2019.
Odgovor korisniku/ci @RevToJa
As far I debug it, I haven't found any incorrect or null ptr in this case.
Reply Retweet Označi sa "sviđa mi se"
CodeColorist 21. sij 2019.
Odgovor korisniku/ci @mishradhiraj_
Did you really understand what format string vuln is? It is just an unhandled malformed URI exception
Reply Retweet Označi sa "sviđa mi se"