Packetstorm Security has released proof of concept code that causes a buffer overflow and denial of service on the Firefox browser. ![]() To be fair, it's taken longer than I thought it would. When Firefox 1.5 was officially released I wondered when the first security vulnerability would be announced. Further, there doesn't seem to be any credible evidence at this time that this could be exploited to execute arbitrary code. Their results match our testing, that we were able to make it take a long time for Firefox to start, but were not able to make it crash. ![]() ![]() Update 2: The official response from the folks at can be found here.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |