[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <a28ffe560610031312s5dc5cac2w5720b09bd39f4fba@mail.gmail.com>
Date: Tue, 3 Oct 2006 13:12:51 -0700
From: "Pink Hat" <pinkhat.h4x0r@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Firefox Vulnerabilities FAKED
Nice to see that a group of idiots can turn a conference into a joke
just as easily as they can a mailing list. Was there any technical
verification from the Toorcon guys before they accepted these asshats
talk?
http://developer.mozilla.org/devnews/index.php/2006/10/02/update-possible-vulnerability-reported-at-toorcon
The main purpose of our talk was to be humorous.
As part of our talk we mentioned that there was a previously known
Firefox vulnerability that could result in a stack overflow ending up
in remote code execution. However, the code we presented did not in
fact do this, and I personally have not gotten it to result in code
execution, nor do I know of anyone who has.
I have not succeeded in making this code do anything more than cause a
crash and eat up system resources, and I certainly haven't used it to
take over anyone else's computer and execute arbitrary code.
I do not have 30 undisclosed Firefox vulnerabilities, nor did I ever
make this claim. I have no undisclosed Firefox vulnerabilities. The
person who was speaking with me made this claim, and I honestly have
no idea if he has them or not.
I apologize to everyone involved, and I hope I have made everything as
clear as possible.
Sincerely,
Mischa Spiegelmock
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists