BackgroundWhen used in a web page, Java references properties of the window.navigator object as it starts up in Firefox or SeaMonkey.
ProblemIf a web page replaces the navigator object before starting Java, then the page could cause the browser to crash in a way that allows arbitrary command execution.
ResolutionUpgrade to Firefox 184.108.40.206 or higher or SeaMonkey 1.0.3 or higher.
LimitationsExploit works on Firefox 220.127.116.11 and requires a user to click on the Exploit button. The Java plug-in must be installed in order for the exploit to succeed. Firefox's automatic update feature must be disabled in order for the exploit to succeed. Note that it may take several minutes for this exploit to succeed because a large amount of memory must be allocated on the target.
Windows XP SP2
Back to exploit index