Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Sep 2007 07:48:44 +0200 (CEST)
From:      "Remko Lodder" <remko@FreeBSD.org>
To:        "Michael Johnson" <ahze@ahze.net>
Cc:        cvs-ports@freebsd.org, cvs-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <42316.194.74.82.3.1190267324.squirrel@galain.elvandar.org>
In-Reply-To: <94F864FD-8307-4D92-A1ED-A4D3106CC7D1@ahze.net>
References:  <200709191650.l8JGolhq060857@repoman.freebsd.org> <94F864FD-8307-4D92-A1ED-A4D3106CC7D1@ahze.net>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, September 19, 2007 11:19 pm, Michael Johnson wrote:
>>
>>   Document mozilla -- code execution via Quicktime media-link files,
>>   The Mozilla advisory talks somewhat about Windows for this matter,
>>   but better be safe then sorry (An updated firefox is available
>> already).
>>
>
> This only really affects Quicktime, the program not video files
> according to http://www.mozilla.org/security/announce/2007/
> mfsa2007-28.html
>
> So FreeBSD should be safe.
>

Hi Michael,

Thanks for commenting on this one, I think that you are right about the
source of the attack, but FireFox safeguards itself now by denying the
QuickTime command-line stuff itself. So I think this does affect the
browser (and not only QuickTime).

Cheers
remko

-- 
Kind regards,

     Remko Lodder               ** remko@elvandar.org
     FreeBSD                    ** remko@FreeBSD.org

     /* Quis custodiet ipsos custodes */




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42316.194.74.82.3.1190267324.squirrel>