Tiger. 10.4.
Apr. 19th, 2005 01:01 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Mmm, I look forward to thee~ http://www.apple.com/macosx/upgrade/compare.html = comparison chart.
T-10 days. I haven't been this excited for an OS update for awhile. Then again, this is the first time I'm paying for it (via school's subscription, so it's only slightly less than $30), instead of getting it illegally.
----
Also, Firefox user? You might be at risk...
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1080895,00.html?track=NL-102&ad=511466
Proof-of-concept code targeting security holes in Firefox and the Mozilla Suite have started appearing on public mailing lists. An attacker could exploit the flaws to launch malicious code. But users can protect themselves by updating to Firefox 1.0.3 and Mozilla Suite 1.7.7.
...
Specifically, the concept code targets:
A glitch where the URL of a Web site "favicons" icon is not verified before being changed through JavaScript. An attacker can exploit this to launch malicious code with escalated privileges using a specially crafted "javascript:" URI. According to Favicon.com, a favicon is a customizable, multi-resolution image included on nearly all professionally developed sites.
An issue in the "_search target" function sites can use to open links in the Firefox sidebar. Two missing security checks allow malicious scripts to open a privileged page [such as about:config] then inject script using a "javascript:" URL. This could be used to install malicious code or steal data without user interaction.</>
T-10 days. I haven't been this excited for an OS update for awhile. Then again, this is the first time I'm paying for it (via school's subscription, so it's only slightly less than $30), instead of getting it illegally.
----
Also, Firefox user? You might be at risk...
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1080895,00.html?track=NL-102&ad=511466
Proof-of-concept code targeting security holes in Firefox and the Mozilla Suite have started appearing on public mailing lists. An attacker could exploit the flaws to launch malicious code. But users can protect themselves by updating to Firefox 1.0.3 and Mozilla Suite 1.7.7.
...
Specifically, the concept code targets:
A glitch where the URL of a Web site "favicons" icon is not verified before being changed through JavaScript. An attacker can exploit this to launch malicious code with escalated privileges using a specially crafted "javascript:" URI. According to Favicon.com, a favicon is a customizable, multi-resolution image included on nearly all professionally developed sites.
An issue in the "_search target" function sites can use to open links in the Firefox sidebar. Two missing security checks allow malicious scripts to open a privileged page [such as about:config] then inject script using a "javascript:" URL. This could be used to install malicious code or steal data without user interaction.</>
no subject
Date: 2005-04-19 06:29 pm (UTC)no subject
Date: 2005-04-19 10:32 pm (UTC)Hehe, secret sauce.
no subject
Date: 2005-04-19 09:58 pm (UTC)Oh, noodles. Mozilla needs a better update mechanism. The whole "uninstall every version for everyn security update" thing gets old quickly...::runs over to get update anyway::
no subject
Date: 2005-04-20 10:07 pm (UTC)(Answer: It's Academic killed my brain.)
no subject
Date: 2005-04-20 10:09 pm (UTC)