lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9470.85.144.210.174.1171319516.squirrel@webmail.xs4all.nl>
Date: Mon, 12 Feb 2007 23:31:56 +0100 (CET)
From: "Ruud H.G. van Tol" <rvtol@...lution.nl>
To: "Michal Zalewski" <lcamtuf@...ne.ids.pl>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Firefox/MSIE focus stealing vulnerability -
	clarification

Michal Zalewski wrote:

>   2) The Firefox attack vector is related to the Charles' CVE-2006-2894,
>      which in turn was a rediscovery of a problem known to Mozilla since
>      2000 (!); attempts to fix it in official releases failed because the
>      problem was repeatedly marked as a duplicate of a too narrowly
>      defined issue with control hiding. A broader redesign probably
>      eliminated the issue in development branches, but it still affects
>      Firefox 1.5 and 2.0.
>
>      This can be considered an independent rediscovery and a more
>      practical demonstration of a previously reported vulnerability.
>      The exploit is here: http://lcamtuf.coredump.cx/focusbug/index.html

Without JavaScript on, this doesn't work. See http://noscript.net/

-- 
Affijn, Ruud


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ