Description
Top Password Firefox Password Recovery 2.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing input fields. Attackers can trigger the vulnerability by inserting 5000 characters into the User Name or Registration Code input fields.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Antonio de la Piedra
References
www.exploit-db.com/exploits/47912 (ExploitDB-47912)
www.top-password.com/ (Vendor Homepage)
www.vulncheck.com/...fox-password-recovery-denial-of-service (VulnCheck Advisory: Top Password Firefox Password Recovery 2.8 - Denial of Service)