Date: Thu, 20 Sep 2007 07:48:44 +0200 (CEST) From: "Remko Lodder" <remko@FreeBSD.org> To: "Michael Johnson" <ahze@ahze.net> Cc: cvs-ports@freebsd.org, cvs-all@freebsd.org, ports-committers@freebsd.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <42316.194.74.82.3.1190267324.squirrel@galain.elvandar.org> In-Reply-To: <94F864FD-8307-4D92-A1ED-A4D3106CC7D1@ahze.net> References: <200709191650.l8JGolhq060857@repoman.freebsd.org> <94F864FD-8307-4D92-A1ED-A4D3106CC7D1@ahze.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, September 19, 2007 11:19 pm, Michael Johnson wrote: >> >> Document mozilla -- code execution via Quicktime media-link files, >> The Mozilla advisory talks somewhat about Windows for this matter, >> but better be safe then sorry (An updated firefox is available >> already). >> > > This only really affects Quicktime, the program not video files > according to http://www.mozilla.org/security/announce/2007/ > mfsa2007-28.html > > So FreeBSD should be safe. > Hi Michael, Thanks for commenting on this one, I think that you are right about the source of the attack, but FireFox safeguards itself now by denying the QuickTime command-line stuff itself. So I think this does affect the browser (and not only QuickTime). Cheers remko -- Kind regards, Remko Lodder ** remko@elvandar.org FreeBSD ** remko@FreeBSD.org /* Quis custodiet ipsos custodes */
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42316.194.74.82.3.1190267324.squirrel>