Exactly! And the so called security experts who are giving long
lectures in the list about how any bug can result in a potential
security flaw, they are forgetting that if a security flaw arises it
arises because of the programmer and not Firefox.

If I use strcpy() to read user input into a buffer, I am at fault and
not C compiler.

On 9/30/07, Andrew Farmer <[EMAIL PROTECTED]> wrote:
> On 28 Sep 07, at 19:25, wac wrote:
> > On 9/28/07, Jimby Sharp <[EMAIL PROTECTED]> wrote:
> >> How is this serious and is it related to security in any manner? If
> >> not, please do not spam. :-(
> >
> >  Many bugs are security related (I would say all). How it is security
> > related? Think. What happens if your bank calculates something
> > wrong and
> > puts the lower in your account and the higher in another account?
> > Yes It
> > might be little but what about a little many
> > times? That could be done with javascript too. Then... you are not
> > safe
> > anymore.
>
> If your bank is doing financial calculations using Javascript in a
> standard web browser, you have bigger things to worry about than
> roundoff errors.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to