lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200407121601.53597.thomas@kaschwig.net>
From: thomas at kaschwig.net (Thomas Kaschwig)
Subject: Is Mozilla's "patch" enough?

Aviv Raff wrote:

> If an attacker has a file writing access to the user's default profile
> directory, or somehow manages to update/create the file user.js (or
> even worse - mozilla.cfg) he can override the patch's configuration
> change, and enable the shell protocol handler again.

Nobody should have write access to your user profile. If someone is able 
to modify your user.js file, (s)he can enable some worse options, e.g. 
the protocol handler for `hcp' or `vbscript', but this is not a security 
flaw of mozilla...

Thomas
-- 
PGP/GnuPG: http://www.kaschwig.net/kaschwig.gpg.asc * KeyID: 0x3D68D63A
Fingerprint: 274A 4CB8 B362 D593 39D6 0989 8FC3 725F 3D68 D63A

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ