Full Disclosure mailing list archives
Re: DoS vulnerability in Internet Explorer
From: Jan Schejbal <jan.mailinglisten () googlemail com>
Date: Thu, 03 Jun 2010 14:23:11 +0200
Am 01.06.2010 14:42, schrieb MustLive:
Vulnerability concerned with handling by browser of expression in styles, which leads to blocking of work of IE.
Usually, a DoS is a vulnerability that crashes the program in a way that might be exploitable. Just making sure the user cannot use the browser anymore? There is a thosand ways to do it. Probably with some of them overloading the system in a way it will be faster to hard-reset it than to try and wait for Task Manager starting trough the load. Gruß Jan -- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- DoS vulnerability in Internet Explorer MustLive (Jun 01)
- Message not available
- Re: DoS vulnerability in Internet Explorer Laurent Gaffie (Jun 01)
- Re: DoS vulnerability in Internet Explorer PsychoBilly (Jun 01)
- Re: DoS vulnerability in Internet Explorer Pablo Ximenes (Jun 02)
- Re: DoS vulnerability in Internet Explorer Laurent Gaffie (Jun 01)
- Message not available
- Re: DoS vulnerability in Internet Explorer Jeff Williams (Jun 02)
- Re: DoS vulnerability in Internet Explorer Christian Sciberras (Jun 02)
- Re: DoS vulnerability in Internet Explorer MustLive (Jun 06)
- Re: DoS vulnerability in Internet Explorer Christian Sciberras (Jun 02)
- Re: DoS vulnerability in Internet Explorer Jan Schejbal (Jun 03)
- Message not available
- Re: DoS vulnerability in Internet Explorer MustLive (Jun 03)
- <Possible follow-ups>
- Re: DoS vulnerability in Internet Explorer Laurent Gaffie (Jun 01)