|
Message-ID: <55929F2D.3020802@redhat.com> Date: Tue, 30 Jun 2015 15:52:45 +0200 From: Florian Weimer <fweimer@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: Google Chrome Address Spoofing (Request For Comment) On 06/30/2015 03:45 PM, Daniel Micay wrote: > It does display a window with the oracle.com address, but I don't > understand why you've got an ever increasing number of setTimeout events > built in here. It's also unclear what you mean about click-to-verify. Is > this bypassing a warning prompt by breaking it with a flood of requests? I have not tried this, but here's some context: Most browsers have issues where they do not update the URL bar when content from a different is shown (i.e., the update happens to late), or they show the new URL while still displaying old content (update too late). I've seen such discrepancies with Firefox, but I don't know if it's still present in current versions. If such bugs are present, freezing browsers while they are showing inconsistent content (hence the DoS attempt) could lead the user to attribute content to the incorrect site. -- Florian Weimer / Red Hat Product Security
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.