lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <008001c4d31b$dc2868b0$230110ac@campus.ad.utdallas.edu> Date: Thu, 25 Nov 2004 12:23:20 -0600 From: "Exchange" <pauls@...allas.edu> To: "Alla Bezroutchko" <alla@...nit.be>, <bugtraq@...urityfocus.com>, <full-disclosure@...ts.netsys.com> Subject: Re: [Full-Disclosure] Re: Sun Java Plugin arbitrary package access vulnerability ----- Original Message ----- From: "Alla Bezroutchko" <alla@...nit.be> To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com> Sent: Thursday, November 25, 2004 4:33 AM Subject: [Full-Disclosure] Re: Sun Java Plugin arbitrary package access vulnerability > > As noted by rodmoses(at)yahoo(dot)com Opera remains vulnerable even > after the upgrade of JVM to version 1.4.2_06. (tested on Windows XP SP2, > Opera 7.54, J2SE 1.4.2_06). > This wasn't mentioned in the original disclosure announcement, but is it safe to assume that jre-1.5.0 would *not* be vulnerable? Or has it not been tested? Paul Schmehl (pauls@...allas.edu) Adjunct Information Security Officer University of Texas at Dallas http://www.utdallas.edu/ AVIEN Founding Member
Powered by blists - more mailing lists