lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <9CE14639FB5043C18D9141015DFD8B5D@acros.si> Date: Fri, 21 Oct 2011 11:06:42 +0200 From: "ACROS Security Lists" <lists@...os.si> To: <bugtraq@...urityfocus.com>, <full-disclosure@...ts.grok.org.uk>, <cert@...t.org>, <si-cert@...es.si> Subject: Google Chrome pkcs11.txt File Planting A month ago our company notified Google about a peculiar behavior of Chrome browser that can be exploited for execution of remote code outside Chrome sandbox under specific conditions. Our new blog post describes it all. http://blog.acrossecurity.com/2011/10/google-chrome-pkcs11txt-file-planting.html or http://bit.ly/olK1P9 Enjoy the reading! Mitja Kolsek CEO&CTO ACROS, d.o.o. Makedonska ulica 113 SI - 2000 Maribor, Slovenia tel: +386 2 3000 280 fax: +386 2 3000 282 web: http://www.acrossecurity.com blg: http://blog.acrossecurity.com ACROS Security: Finding Your Digital Vulnerabilities Before Others Do _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists