Date: 2004-07-12 09:11 am (UTC)
I have indeed got the wrong end of the stick, the permutation of the 'shell:' URI handler vulnerability is evidently not the one you are talking about, rather the "Location:" local resource access vulnerability. The previous vulnerability in IE 6 is indeed not patched, however there are reports that alterations have been made to SP2 prevents exploitation by denying access. This all goes to show the Microsoft's ineptitude in auditing code and designing systems securely and yet they STILL seem convinced that the only responsibility they have towards their customer's security while using their products is the offering of half a million dollar rewards for various worm authors.

I feel the difference between Internet Explorer and Mozilla/Firefox runs far deeper than the exploit to patch response time, it lies in the fact they have concise and open discussions about the design of their products, audit their code thoroughly and document the protocols they use for design and auditing thoroughly. This general openness that is systemic to gnu/open source movement does not allow the shoddy code and design to exist (anymore at any rate - the BIND/WU-FTPd/Sendmail debate is a dull one so lets not have it) in the various popular products - Qmail, vsftpd, FreeBSD and OpenBSD all being good examples of this.

"who am i?" an innocent bystander..
(will be screened)
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

Profile

ciphergoth: (Default)
Paul Crowley

January 2025

S M T W T F S
   1234
5678 91011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 22nd, 2026 06:34 pm
Powered by Dreamwidth Studios