lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200604261615.49802.Aaron@systech-computers.com>
Date: Wed, 26 Apr 2006 16:15:46 -0700
From: Aaron Phillips <Aaron@...tech-computers.com>
To: bugtraq@...urityfocus.com
Subject: Re: Apple Mac OS X Safari 2.0.3 Vulnerability

Konqueror 2.3.1 and Firefox 2.0a1 don't appear to be vulnerable. Be nice to 
hear about Opera and IE.

On Wednesday 26 April 2006 07:41, jens@....com wrote:
> All this does is cause Safari to allocate oodles of memory. It won't crash
> or hang the OS, just cause it to slow down due to VM paging. Wait a bit and
> the force-quit alert will appear (and/or Safari will crash when it runs out
> of address space.) Seems more of an annoyance than an actual security
> problem.
>
> How do Firefox, IE and Opera respond?

-- 
//Begin sig

Aaron Phillips
Technician, SYSTECH Computers
989-743-4296

I sign all of my messages with a PGP Public Key using the Open Source version 
of PGP, GNU Privacy Guard. More information is available at the website 
http://www.gnupg.org/

My public key is available for import on hkp://subkeys.pgp.net and also 
http://www.systech-computers.com/keys

//End sig

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ