lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <559A2357.5010507@deusen.co.uk> Date: Mon, 06 Jul 2015 07:42:31 +0100 From: David Leo <david.leo@...sen.co.uk> To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org, oss-security@...ts.openwall.com Subject: [FD] Google Chrome Address Spoofing - Google's Opinion It's public now: https://code.google.com/p/chromium/issues/detail?id=497588 Interesting Points: They did reproduce "I can reproduce this locally" They say it's DoS "seems like any renderer denial-of-service" (The browser does not crash!) They say it's not security issue "remove security flags from this bug" Finally, they stopped replying "Jun 10" to "Jul 2" (unbelievable huge delay) In the end, they get it "Lots of phishing attacks these days tell you to call a phone number" "No interactions" Currently, it's "Severity-Medium". Kind Regards, PS http://dieyu.org/ Updated! _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists