Dailydave mailing list archives
Re: Re: Dailydave Digest, Vol 23, Issue 15
From: robert () dyadsecurity com
Date: Mon, 25 Apr 2005 23:09:45 -0700
tobaccofarm(phaceton () gmail com)@Tue, Apr 26, 2005 at 08:00:44AM +0200:
"If she went to the wrong website that wanted to exploit her browser, it would only be able to do things from the security context you allowed for her browser." And there's no buffer overflow posssibility? SElinux doesn't protect against all sorts of buffer overflows?
In the example I was assuming an exploit such as that did occur. Once the running instance of the web browser is compromised, the exploit is only capable of doing things from the context of the browser application. In the example I wasn't concerned with stopping the buffer overflow. I was concerned about being able to limit the damage of the exploitation. Robert -- Robert E. Lee CEO, Dyad Security, Inc. W - http://www.dyadsecurity.com E - robert () dyadsecurity com M - (949) 394-2033 _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com https://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Re: Dailydave Digest, Vol 23, Issue 15 tobaccofarm (Apr 25)
- Re: Re: Dailydave Digest, Vol 23, Issue 15 robert (Apr 25)