Skip to content

Commit e4c3093

Browse files
Merge pull request #18 from github/xcorail-patch-3
Link to new site instead of old semmle blog
2 parents def8de3 + a5cd821 commit e4c3093

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

  • SecurityExploits/Facebook/Fizz/CVE-2019-3560

SecurityExploits/Facebook/Fizz/CVE-2019-3560/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Remote DOS in Facebook Fizz (CVE-2019-3560)
22

3-
[Fizz](https://github.com/facebookincubator/fizz) contains a remotely triggerable infinite loop. It is due to an integer overflow in this [compound assignment](https://github.com/facebookincubator/fizz/blob/eaa81af854bef509c3c1d7c83df0cd0b084a0fef/fizz/record/PlaintextRecordLayer.cpp#L42). For more details about the bug, see this [blog post](https://lgtm.com/blog/facebook_fizz_CVE-2019-3560).
3+
[Fizz](https://github.com/facebookincubator/fizz) contains a remotely triggerable infinite loop. It is due to an integer overflow in this [compound assignment](https://github.com/facebookincubator/fizz/blob/eaa81af854bef509c3c1d7c83df0cd0b084a0fef/fizz/record/PlaintextRecordLayer.cpp#L42). For more details about the bug, see this [blog post](https://securitylab.github.com/research/facebook-fizz-CVE-2019-3560).
44

55
The scenario for the demo is that there are two computers, named "fizz-server" and "fizz-attacker". The attacker sends a malicious message which triggers an infinite loop on the server. The demo uses [docker](https://www.docker.com/) to simulate the two computers. See below for instructions.
66

0 commit comments

Comments
 (0)