[Full-disclosure] Apple Safari ... DoS Vulnerability
scarybeasts at gmail.com
Tue Mar 3 06:49:41 GMT 2009
On Mon, Mar 2, 2009 at 6:28 PM, Nick FitzGerald
<nick at virus-l.demon.co.uk> wrote:
> Chris Evans to Thierry Zoller:
>> > Example
>> > If a chrome tab can be crashed arbritarely (remotely) it is a DoS attack
>> > but with ridiculy low impact to the end-user as it only crashes the tab
>> > it was subjected to, and not the whole browser or operation system.
>> > But the fact remains that this was the impact of a DoS condition,
>> > the tab crashes arbritarily.
>> Eh? If you visit www.evil.com and your tab crashes, that's no
> But what if www.evil.com has run an injection attack of some kind (SQL,
> XSS in blog comments, etc, etc) against www.stupid.com?
> Visitors to stupid.com then suffer a DoS...
So, you have injected HTML into stupid.com, and you choose to inflict
the fury of a closing tab upon hapless visitors?
> Yes, stupid.com should run their site better, fix their myriad XSS holes,
> etc, etc.
> But this is the Internet, so this "software flaw" can be leveraged as
> security vulnerability.
> I'm with Thierry on this...
> Nick FitzGerald
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure is hosted and sponsored by Secunia.