Firefox Susceptible To QuickTime Security Flaw 231
Hugh Pickens writes "Apple's QuickTime media player software contains a previously undocumented security weakness in the way QuickTime handles the RTSP media-streaming protocol. The vulnerability is present in QuickTime versions 4.0 through 7.3 (the latest version) on both Windows and Mac systems. Symantec has tested the publicly available exploit code and found that it failed to work properly against Internet Explorer 6/7 or Safari 3 Beta but the exploit works against Firefox if users have chosen QuickTime as the default player for multimedia formats. Firefox users are more susceptible to this attack because Firefox farms off the request directly to the QuickTime Player as a separate process outside of its control, while IE loads the QuickTime Player as an internal plugin and when the overflow occurs, standard buffer-overflow protection is triggered, shutting down the affected processes before any damage can occur."
That does it for me... (Score:5, Funny)
Troll -1 (Score:4, Funny)
Re:And this is a firefox problem... (Score:5, Funny)
The optimist says the glass is half full. The pessimist says the glass is half empty. The scientist says there is
Re:And this is a firefox problem... (Score:5, Funny)
Jack Bauer found out where the glass was, who drank the water, and which government they worked for.
Re:And this is a firefox problem... (Score:5, Funny)
Re:And this is a firefox problem... (Score:1, Funny)