[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5810344345.20100528221756@SECURITY.NNOV.RU>
Date: Fri, 28 May 2010 22:17:56 +0400
From: "Vladimir '3APA3A' Dubrovin" <3APA3A@...URITY.NNOV.RU>
To: "John Smith" <at-x@...e.com>
Cc: "MustLive" <mustlive@...security.com.ua>,
"Susan Bradley" <sbradcpa@...bell.net>, <bugtraq@...urityfocus.com>
Subject: Re[2]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers
Dear John Smith,
Actually, browser DoS may be quite serious vulnerability, depending on
nature of DoS. Think about e.g. banner or content exchange network,
social networks, web boards, etc where browser vulnerability may be
used against site or page because it will harm any visitors of this
site or page.
In case of this very vulnerability, most serious impact may be from
e-mail vector.
--Friday, May 28, 2010, 7:07:50 PM, you wrote to mustlive@...security.com.ua:
JS> Just a few cents - DoS in webbrowsers doesn't fall under the category of
JS> "vulnerabilities" rather more of "annoyances". Although I don't deny the
JS> fact that certain DoS attacks *may lead* or *may serve as hints* to other
JS> more serious exploits, but that's a different topic and with ASLR in the
JS> scene, a very grey area of discussion.
--
Skype: Vladimir.Dubrovin
~/ZARAZA http://securityvulns.com/
Стреляя во второй раз, он искалечил постороннего. Посторонним был я. (Твен)
Powered by blists - more mailing lists