Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Mozilla Security Advisory 2004-07-08
From: Gary Flynn <flynngn () jmu edu>
Date: Fri, 09 Jul 2004 09:28:23 -0400

Berend-Jan Wever wrote:
The advisory mentions that combining this with a BoF can result in remote code execution, but they totally forget to mention 
that formatstring exploits, integeroverflows, XSS, SQL injection, etc... might cause the same problems too. I bet they just 
read FD and didn't think for themselves. As far as I can see, this bug allows an attacker to remotely abuse any 
vulnerability a local program might be subject to, thus making any local exploit a possible remote exploit.

It would seem that one would have to be able to pass
parameters to the file being called for these types of
attacks to be possible.

Gary Flynn
Security Engineer
James Madison University

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]