I suppose my problem is I'm going by several different experts in the field
instead of deferring to hobbyists for my information.

Mike

On Wed, Jun 4, 2008 at 9:03 AM, Matthew Taylor <[EMAIL PROTECTED]>
wrote:

> On Jun 4, 2008, at 11:13 AM, mike wrote:
>
>
>> http://www.pcworld.com/article/id,145985-page,1/article.html?tk=synd_macworld
>>
>> A good explanation of the problem from a mac source.  The bottom line is
>> this apparently:   The problem arises "because the Safari browser cannot
>> be
>> configured to obtain the user's permission before it downloads a
>> resource,"
>>
>
> This is a feature issue, not a security issue, ie social engineering.  If
> the user says "Yes" and downloads the malware including package to the
> desktop, boom, package delivered.  The problem is the vulnerability being
> exploited on the Windows side.  Can you name any browser that natively will
> not download malware even if the users approves?
>
>>
>>
>> The other main sticking point is that even if MS fixes their bug, and they
>> are already doing so, the safari bug will STILL AFFECT systems.  The same
>> problem that works in conjuction with the MS bug, can be exploited in
>> other
>> ways.
>>
>
> How?  By downloading malware to another vulnerable location?  Again, this
> is Safari's problem?
>
>
>>
>
> *************************************************************************
> **  List info, subscription management, list rules, archives, privacy  **
> **  policy, calmness, a member map, and more at http://www.cguys.org/  **
> *************************************************************************
>


*************************************************************************
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*************************************************************************

Reply via email to