Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Mozilla Security Advisory 2004-07-08
From: Gary Flynn <flynngn () jmu edu>
Date: Fri, 09 Jul 2004 09:28:23 -0400

Berend-Jan Wever wrote:
The advisory mentions that combining this with a BoF can result in remote code execution, but they totally forget to mention 
that formatstring exploits, integeroverflows, XSS, SQL injection, etc... might cause the same problems too. I bet they just 
read FD and didn't think for themselves. As far as I can see, this bug allows an attacker to remotely abuse any 
vulnerability a local program might be subject to, thus making any local exploit a possible remote exploit.

It would seem that one would have to be able to pass
parameters to the file being called for these types of
attacks to be possible.


--
Gary Flynn
Security Engineer
James Madison University

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault