lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 10 Jul 2014 13:50:52 -0500
From: Brandon Perry <>
To: Nick Boyce <>
Cc: "" <>
Subject: Re: [FD] FireFox: Lab Mouse Security: Remote Code Execution via
 Browser (LZO)

Are we sure it isn't a plugin like mplayer or something that is popping the
shell, and not FF itself?

On Thu, Jul 10, 2014 at 11:20 AM, Nick Boyce <> wrote:

> On 9 July 2014 18:50, Lee <> wrote:
> > I know nothing about this, but some friends kept posting a link to this
> > video.  I saw nothing about this in the mailing list, so I thought I
> would
> > post it to see if others have more info.
> >
> Well the video is allegedly uploaded by Don Bailey, who is the person
> who did the LZO/LZ4 bug research that was recently responsibly
> reported on the OSS list(s).  And I did notice at the time that one of
> the postings [1] in the ensuing discussion, from Yves-Alexis Perez,
> gave a list of potentially affected open-source software which had
> been identified by a source-code-scanning service.  That list included
> Firefox ... and since then I've been holding my breath waiting for the
> other shoe to drop.
> Maybe this is that other shoe.
> I know nothing about the Firefox source-code, or where exactly the
> vulnerable use of LZO/LZ4 might be.
> But it's odd that there hasn't been a peep out of Mozilla (e.g. no
> emergency release announced for ESR or any other channel), despite the
> vulnerability having been disclosed responsibly on private vendor
> mailing lists, with a patch available, and plenty of time to
> coordinate binary releases.
> Hey - maybe the bug is real, but the Youtube clip was uploaded by a
> Bad Guy pretending to be Don, and all those of us (367 at time of
> writing) who viewed the clip are now pwned :-)
> Dammit - if only we'd all signed up for's weirdo
> GPG-key-identifying service [2] then we could all have known whether
> Youtube Don is really LZO Don ...
> Exciting times.
> [1]
> [2]
> Cheers
> Nick
> --
> Blessed are the peacemakers...for they shall be shot at from both sides.
>  ~~ A.M. Greeley
> _______________________________________________
> Sent through the Full Disclosure mailing list
> Web Archives & RSS:

-- -- blog -- website

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists